bfd01b4aa7eb8fe3"}) r1 = syz_open_dev$vcsn(&(0x7f00000004c0)='/dev/vcs#\x00', 0x8, 0x101002) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000580)={'ipvs\x00'}, &(0x7f00000005c0)=0x1e) 14:16:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x541e, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:13 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x70, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x70}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:16:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x8200, &(0x7f00000004c0)="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"}) open_by_handle_at(r0, &(0x7f0000000040)={0x57, 0x9d09, "c22d72f9b12f1174b0fdb2d66bf7674bf114b46caa295d0f82a51a230a1b1f505c2fb952ccd2df6b6da647749d4465d9d1d527cbc362276b169dbca6990b56942ecebc15bca8305dbbbdf7288cd3b8"}, 0x428000) 14:16:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5421, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x9effffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:13 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5422, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:16:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0x4102, 0x14) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fallocate(r2, 0xc, 0x200, 0x25c0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000040)={0x2, 0x1, 0x20, 0x55, 0xf5, &(0x7f0000000500)="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"}) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000080)) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f00000004c0)="40e81af2e50ac17c75189bf9fd56eedb0da1d19b") socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000900)={0x7, 0x53, 0xfffffffe, 0xa0, 0x19, "b3a713f65a20fb3d6c27294aaaa6c89b7cc0c1"}) 14:16:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:14 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x70, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x70}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:16:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xffffa888}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@access={'system_u:object_r:cert_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x8}, 0x41) 14:16:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:14 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5425, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xfffff000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:16:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f00000004c0)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5427, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:15 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x70, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x70}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 14:16:15 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x2, 0x1, &(0x7f00000000c0)="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"}) 14:16:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:15 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5428, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:16:16 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5429, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@delqdisc={0xa8, 0x25, 0x100, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xffff}, {0xc, 0xffe0}, {0x5, 0xfff3}}, [@TCA_EGRESS_BLOCK={0x8}, @TCA_STAB={0x7c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x3, 0x800, 0x101, 0x0, 0x800, 0x0, 0x1}}, {0x6, 0x2, [0x40]}}, {{0x1c, 0x1, {0xff, 0x4f, 0x5f, 0x8, 0x0, 0x0, 0x80, 0x6}}, {0x10, 0x2, [0x2, 0x7, 0x1, 0x1, 0x1, 0x101]}}, {{0x1c, 0x1, {0x1, 0x8, 0x8, 0x80008000, 0x1, 0x0, 0x4, 0x4}}, {0xc, 0x2, [0xb33d, 0x2, 0x2, 0x400]}}]}]}, 0xa8}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000080)={0x9a0000, 0x7, 0x0, r3, 0x0, &(0x7f0000000040)={0xa00903, 0x81, [], @ptr=0x2}}) ioctl(r4, 0x7ff, &(0x7f00000004c0)="c96b0cbee5497aaf48e6d1c54fb74b8a8addc74ee81b9142c6ed082e236e2ed783e915a83dd23133c7a8c282078ec76d8cbc2b2c8c9905f4c084f99ed1b422f19b761d9d0466da8c0bd662cfa1ba94473af955d9915fb3a02b5eee87bc652a5d3ab89d5f4ad6a06af2edff78fd83f97da75164367d76d48e7fa3a69b4ceeca41fb8644cbc0452ce4aab2a06cab6c86ce4a8345407a0eea1ecbd01093e792ae9d470cf3abfc5e16d3e0167d6426341cce191c377b76ed703ca066cd6bf0c01cc37a27cefc211f542c8cf325c443c01adb90b1de62782d3ee8ef0851e5b0ac7b861327a466") ioctl$PPPIOCDISCONN(r1, 0x7439) 14:16:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0xffffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:16 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x70, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x70}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 14:16:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:16 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5437, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0xfffe, 0x0, &(0x7f00000000c0)="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"}) 14:16:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:16:17 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5441, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000500)={0x3, 0x0, 0x0, 0x4}) ptrace$cont(0x9, r1, 0x0, 0x0) r3 = syz_open_procfs(r1, &(0x7f0000000040)='net/netlink\x00') ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f00000004c0)={0x8, &(0x7f0000000080)=[{0x9, 0x3}, {0xfff, 0x7}, {0x101, 0x8}, {0x1249, 0x3}, {0x7a80, 0xb4}, {0x5, 0x6}, {0x400, 0x8}, {0x8000, 0x3}]}) r4 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5, r6, r7, r6, 0x0, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, 0x0, 0x0, 0x81}) shmctl$SHM_LOCK(r4, 0xb) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:17 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x70, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x70}}, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 14:16:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:17 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5450, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:17 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f00000004c0)={0x170, 0xb, 0x6, 0x5, 0x0, 0x0, {0xb, 0x0, 0x7}, [@IPSET_ATTR_ADT={0xbc, 0x8, 0x0, 0x1, [{0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth0_to_bond\x00'}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @multicast2}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x4}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x4}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x400}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'nr0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x66f}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x2}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x7f}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x3}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x50, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0xba}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e24}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e21}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x16, 0x1a, 'ppp0keyringeth0[*\x00'}}]}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x800}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x20004000}, 0x4008015) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:16:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5451, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:18 executing program 3: prctl$PR_CAPBSET_READ(0x17, 0x7) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000040)=0xf000) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) 14:16:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:16:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000500)=0x3) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = socket(0x2, 0x803, 0xff) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) llistxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/124, 0x7c) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x14, &(0x7f0000000000)={r6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={r6, 0x2, 0x100, 0x80}, &(0x7f0000000080)=0x10) ptrace$poke(0x5, 0x0, &(0x7f0000000600), 0x2) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000004c0)={r7, 0x1}, 0x8) 14:16:18 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x545d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:18 executing program 4: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:19 executing program 4: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5460, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:19 executing program 4: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5600, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f0000001340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001300)={&(0x7f0000000080)={0x3c, 0x1402, 0x200, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000001}, 0x4004) write$binfmt_aout(r1, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x47d) r6 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r6) keyctl$get_security(0x11, r6, &(0x7f00000018c0)=""/10, 0xa) 14:16:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:16:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5601, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1368.000999] selinux_nlmsg_perm: 63 callbacks suppressed [ 1368.001014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=722 sclass=netlink_route_socket pig=29895 comm=syz-executor.3 14:16:20 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1368.101266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=722 sclass=netlink_route_socket pig=29895 comm=syz-executor.3 14:16:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5602, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f00000004c0)={0x6, "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"}) r2 = open(0x0, 0x0, 0x20) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f0000000080)={0x6, 'ip6gretap0\x00', {0x5}, 0x7}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0xfff9, 0xbca, 0x9, 0x100, 0x12, "58be617300"}) 14:16:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:16:20 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:21 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5605, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5606, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, 0x0) 14:16:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:16:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, 0x0) 14:16:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5607, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5608, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, 0x0) 14:16:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:22 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1370.281735] FAULT_INJECTION: forcing a failure. [ 1370.281735] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.320774] CPU: 0 PID: 29991 Comm: syz-executor.4 Not tainted 4.19.112-syzkaller #0 [ 1370.328685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.338044] Call Trace: [ 1370.340651] dump_stack+0x188/0x20d [ 1370.344301] should_fail.cold+0xa/0x1b [ 1370.348207] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1370.353337] __should_failslab+0x115/0x180 [ 1370.357592] should_failslab+0x5/0xf [ 1370.361315] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1370.365998] ? security_capable+0x8e/0xc0 [ 1370.370250] vt_do_kdgkb_ioctl+0x74/0xb60 [ 1370.374409] ? security_capable+0x8e/0xc0 [ 1370.378581] vt_ioctl+0x446/0x2310 [ 1370.382129] ? complete_change_console+0x390/0x390 [ 1370.387065] ? lock_downgrade+0x740/0x740 [ 1370.391224] ? check_preemption_disabled+0x41/0x280 [ 1370.396253] ? avc_has_perm_noaudit+0x33d/0x520 [ 1370.400926] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1370.406132] ? complete_change_console+0x390/0x390 [ 1370.411115] tty_ioctl+0x7a1/0x1420 [ 1370.414748] ? tty_vhangup+0x30/0x30 [ 1370.418483] ? cred_has_capability+0x162/0x2e0 [ 1370.423069] ? cred_has_capability+0x16d/0x2e0 [ 1370.427659] ? selinux_ipv4_output+0x50/0x50 [ 1370.432095] ? __fget+0x319/0x510 [ 1370.435555] ? tty_vhangup+0x30/0x30 [ 1370.439275] do_vfs_ioctl+0xcda/0x12e0 [ 1370.443168] ? selinux_file_ioctl+0x125/0x5d0 [ 1370.447670] ? check_preemption_disabled+0x41/0x280 [ 1370.452693] ? ioctl_preallocate+0x200/0x200 [ 1370.457105] ? selinux_file_mprotect+0x600/0x600 [ 1370.461864] ? __fget+0x340/0x510 [ 1370.465323] ? iterate_fd+0x350/0x350 [ 1370.469138] ? security_file_ioctl+0x6c/0xb0 [ 1370.473562] ksys_ioctl+0x9b/0xc0 [ 1370.477022] __x64_sys_ioctl+0x6f/0xb0 [ 1370.480917] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1370.485507] do_syscall_64+0xf9/0x620 [ 1370.489316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.494507] RIP: 0033:0x45c849 [ 1370.497734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.516657] RSP: 002b:00007f0358862c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1370.524380] RAX: ffffffffffffffda RBX: 00007f03588636d4 RCX: 000000000045c849 [ 1370.531655] RDX: 0000000020000000 RSI: 0000000000004b49 RDI: 0000000000000003 [ 1370.539027] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1370.546302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1370.553582] R13: 000000000000041b R14: 00000000004c6bb6 R15: 0000000000000000 14:16:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x0, 0x0) 14:16:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x345}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:22 executing program 4 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560c, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x0, 0x0) 14:16:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560e, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b2f, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b30, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x0, 0x0) 14:16:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b31, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000002740)='/selinux/enforce\x00', 0x200600, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000002780)={0x8, "0443f3"}, 0x6) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001800)=ANY=[@ANYBLOB="580e000030003dfa000000000000000000000000440e0100400e01000a0001007065646974000000000000000007058004000680200e040000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c52e0d59fbc0188d210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000021cb1a44d97975875a21eba8c6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000626b5ac00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000600111f3646a7169dab7996229ef1aca524efe4e9c4d48dfaaf0af0344c8258bad8792ea7f2511542eaacc79c006b69612fb309e9fe98fb612dc9db932aa6640242775fe0bd5565d7cff1ff61b43eb8823ec9e3f9f62922c3b3998a13830a5174adf492194639a9ac0d2aadcae4293b2282ea44ab27e5e9bdfce4e6766f5b0a697b9544287a97c191334128827b643b7fc0e1bada8faa022a1a99b97e8a653dd3514d39358011768acdd399fee326d1b77a9ee229215c5106f010d37c18f73fad698524f30ba0b5a036"], 0xe58}}, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/mdstat\x00', 0x0, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r5, &(0x7f00000017c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001780)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x810}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001380)=@raw={'raw\x00', 0x9, 0x3, 0x330, 0x118, 0x0, 0x118, 0x118, 0x0, 0x260, 0x260, 0x260, 0x260, 0x260, 0x3, &(0x7f0000001340), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x0, 0x6, 0x0, [0x7fff, 0xfffe, 0x16, 0x8, 0x0, 0x8, 0x9, 0x0, 0x3f, 0xfffc, 0x4, 0x8, 0x1f, 0x1a, 0x6, 0x1], 0xa}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0xfc2, 0xdc}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x6}}, @common=@ah={{0x30, 'ah\x00'}, {[0x4d3, 0x4d6], 0x1, 0xff}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x7ff, 0x9, 0xf26, 'syz1\x00', {0x7ff}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x40}, {0x0, 0x0, 0xb17}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f00000004c0)) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000040)={0x1, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x2, r7}) r8 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r8, 0xc0845658, &(0x7f0000002800)={0x0, @reserved}) 14:16:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b32, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1372.729774] netlink: 3632 bytes leftover after parsing attributes in process `syz-executor.3'. 14:16:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560f, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1372.789511] netlink: 3632 bytes leftover after parsing attributes in process `syz-executor.3'. 14:16:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b33, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r2, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x10) 14:16:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b34, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:25 executing program 3: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) 14:16:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:25 executing program 5 (fault-call:9 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:16:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b35, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x40087602, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1373.753441] FAULT_INJECTION: forcing a failure. [ 1373.753441] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.795465] CPU: 0 PID: 30128 Comm: syz-executor.5 Not tainted 4.19.112-syzkaller #0 [ 1373.803377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.812730] Call Trace: [ 1373.815325] dump_stack+0x188/0x20d [ 1373.818964] should_fail.cold+0xa/0x1b [ 1373.822864] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1373.827973] ? __lock_is_held+0xad/0x140 [ 1373.832048] __should_failslab+0x115/0x180 [ 1373.836291] should_failslab+0x5/0xf [ 1373.840014] kmem_cache_alloc_node_trace+0x272/0x750 [ 1373.845136] ? netlink_insert+0x14c/0x10b0 [ 1373.849378] ? __local_bh_enable_ip+0x159/0x270 [ 1373.854057] ? netlink_insert+0x14c/0x10b0 [ 1373.858298] __get_vm_area_node+0x128/0x3a0 [ 1373.862652] __vmalloc_node_range+0xd8/0x790 [ 1373.867072] ? netlink_sendmsg+0x5b9/0xcd0 [ 1373.871431] ? netlink_sendmsg+0x5b9/0xcd0 [ 1373.875674] vmalloc+0x67/0x80 [ 1373.878863] ? netlink_sendmsg+0x5b9/0xcd0 [ 1373.883103] netlink_sendmsg+0x5b9/0xcd0 [ 1373.887172] ? netlink_unicast+0x6a0/0x6a0 [ 1373.891421] ? netlink_unicast+0x6a0/0x6a0 [ 1373.895659] sock_sendmsg+0xcf/0x120 [ 1373.899379] sock_no_sendpage+0xf8/0x140 [ 1373.903446] ? sock_kzfree_s+0x60/0x60 [ 1373.907353] ? perf_trace_lock+0x4c0/0x4c0 [ 1373.911599] ? lock_downgrade+0x740/0x740 [ 1373.915773] ? lock_acquire+0x170/0x400 [ 1373.919762] ? pipe_lock+0x63/0x80 [ 1373.923318] ? sock_kzfree_s+0x60/0x60 [ 1373.927215] kernel_sendpage+0x82/0xd0 [ 1373.931202] sock_sendpage+0x84/0xa0 [ 1373.934929] pipe_to_sendpage+0x263/0x320 [ 1373.939084] ? kernel_sendpage+0xd0/0xd0 [ 1373.943152] ? direct_splice_actor+0x160/0x160 [ 1373.947751] ? splice_from_pipe_next.part.0+0x24f/0x2f0 [ 1373.953126] __splice_from_pipe+0x38f/0x7a0 [ 1373.957460] ? direct_splice_actor+0x160/0x160 [ 1373.962047] ? direct_splice_actor+0x160/0x160 [ 1373.966638] splice_from_pipe+0xd9/0x140 [ 1373.970723] ? splice_shrink_spd+0xc0/0xc0 [ 1373.974990] ? security_file_permission+0x84/0x220 [ 1373.979936] ? splice_from_pipe+0x140/0x140 [ 1373.984283] do_splice+0x5ea/0x1250 [ 1373.987922] ? iterate_fd+0x350/0x350 [ 1373.991744] ? opipe_prep.part.0+0x2c0/0x2c0 [ 1373.996172] __x64_sys_splice+0x2b5/0x320 [ 1374.000340] do_syscall_64+0xf9/0x620 [ 1374.004155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.009352] RIP: 0033:0x45c849 [ 1374.012545] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1374.031464] RSP: 002b:00007ff69b0d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1374.039171] RAX: ffffffffffffffda RBX: 00007ff69b0d86d4 RCX: 000000000045c849 14:16:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000008c0)={&(0x7f0000000540)="6ba73d4a607cdbb40a80fd862148f11178de2dab2d8bc23e21966f84ab9bec1e1e1c3497fb3a9fd58904faa937de86e697a37589d3384493c09525d2dbb71d88d6f47d3a61f286d6d4356671b5ba2754f185b8e7af55eb0cbf6e8ed3b5fe974a279dd8e1099ec8c7b9fa20caabb684c3f3d328d4b0c251baf066cb00e2b778483b5852a43b0c5f9ef4a940981cfb5a6b408cf4ecd288c1d51bb1e96a3cf47d37f69d35c155c6b8ae7b35269941", &(0x7f0000000600)=""/222, &(0x7f0000000700)="4f0b64c6af768fe4e02150d40c4c5aa98520e7c136b7c68f761a2c1e3ff5e7b0632ca3b0806532de2e67eecc1f08ba92b482e52fa64e92cbd49619a5eb6f02258fe390dc92f7544b0c6c2421d86453e4bc06e52ae3ce9bdd86b4d4f93cdc0557074786f530f9c65876c92e258c05112a22554c653d2d6d80d23b1b7d12302fb102add386a1083b6190b493baf4531fd3c1550b6a7b09bdfca5c4976f", &(0x7f00000007c0)="65ffa30e8e1deb68cd735758b6d41ffe871350275dd1df296e426f616ee58ee78339164dacd2e8aa9cd96fe0a4f12a8dcd8a343d55a336df271d777b65c0fc8452a2c50e2c5640b4dcc95e6539851e377a5d2acec72664cffe57b1cc0dfafe1aed1d7953097ec2de80b8ccc922c88c3f8ee092b1e5579d42fdd3dc0b3d8da035a327599bdfa5e4a0725321cb15649eba826889b67a6dcfff5c785e4ce6a5aafc0fb86d0617957672f1a54e5f2c3b735ed3886d713c395b3e0fc8ff8b819f00da98fe088211239b91ca70e91cbdb9d81647fb85d3fee1caf271d92b8fe10725f43c75781269f3cf9a1be147be8cd00c832edb7bce6c08", 0x5eb3fad, r1}, 0x38) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000004c0)={0x9b0000, 0x8, 0x40000, r0, 0x0, &(0x7f0000000080)={0xa2090c, 0x5, [], @p_u8=&(0x7f0000000040)=0x3f}}) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000500)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20100, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000080)={0x5f83, 0x2, [0x3, 0x5, 0x4, 0x3, 0x20], 0x1800}) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000004c0)={[], 0x2, 0x1f, 0x2, 0x0, 0x7, 0x6000, 0x4, [], 0x1}) 14:16:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80045432, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) 14:16:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) readlink(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)=""/255, 0xff) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000580)={"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"}) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) readlinkat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)=""/75, 0x4b) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000040)={0x7ff, 0x400, 0x1, 0xdf9, 0x7ffffffe, 0x0, 0x5}) [ 1374.046439] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000005 [ 1374.053711] RBP: 000000000076bfa0 R08: 000000000004ffe0 R09: 0000000000000000 [ 1374.060986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 1374.068254] R13: 0000000000000b9e R14: 00000000004ce6a2 R15: 0000000000000000 [ 1374.084157] syz-executor.5: vmalloc: allocation failure: 4416 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1374.112627] syz-executor.5 cpuset=syz5 mems_allowed=0-1 [ 1374.120832] CPU: 1 PID: 30128 Comm: syz-executor.5 Not tainted 4.19.112-syzkaller #0 [ 1374.128743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.138100] Call Trace: [ 1374.140815] dump_stack+0x188/0x20d [ 1374.144465] warn_alloc.cold+0x7b/0x173 [ 1374.148460] ? zone_watermark_ok_safe+0x260/0x260 [ 1374.153321] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1374.158357] ? netlink_insert+0x14c/0x10b0 [ 1374.162612] ? __get_vm_area_node+0x2df/0x3a0 [ 1374.167132] __vmalloc_node_range+0x499/0x790 [ 1374.171649] ? netlink_sendmsg+0x5b9/0xcd0 [ 1374.175900] vmalloc+0x67/0x80 [ 1374.179113] ? netlink_sendmsg+0x5b9/0xcd0 [ 1374.183352] netlink_sendmsg+0x5b9/0xcd0 [ 1374.187405] ? netlink_unicast+0x6a0/0x6a0 [ 1374.191628] ? netlink_unicast+0x6a0/0x6a0 [ 1374.195848] sock_sendmsg+0xcf/0x120 [ 1374.199546] sock_no_sendpage+0xf8/0x140 [ 1374.203591] ? sock_kzfree_s+0x60/0x60 [ 1374.207462] ? perf_trace_lock+0x4c0/0x4c0 [ 1374.211678] ? lock_downgrade+0x740/0x740 [ 1374.215811] ? lock_acquire+0x170/0x400 [ 1374.219780] ? pipe_lock+0x63/0x80 [ 1374.223324] ? sock_kzfree_s+0x60/0x60 [ 1374.227194] kernel_sendpage+0x82/0xd0 [ 1374.231069] sock_sendpage+0x84/0xa0 [ 1374.234767] pipe_to_sendpage+0x263/0x320 [ 1374.238900] ? kernel_sendpage+0xd0/0xd0 [ 1374.242945] ? direct_splice_actor+0x160/0x160 [ 1374.247520] ? splice_from_pipe_next.part.0+0x24f/0x2f0 [ 1374.252889] __splice_from_pipe+0x38f/0x7a0 [ 1374.257206] ? direct_splice_actor+0x160/0x160 [ 1374.261800] ? direct_splice_actor+0x160/0x160 [ 1374.266369] splice_from_pipe+0xd9/0x140 [ 1374.270417] ? splice_shrink_spd+0xc0/0xc0 [ 1374.274666] ? security_file_permission+0x84/0x220 [ 1374.279590] ? splice_from_pipe+0x140/0x140 [ 1374.283907] do_splice+0x5ea/0x1250 [ 1374.287534] ? iterate_fd+0x350/0x350 [ 1374.291320] ? opipe_prep.part.0+0x2c0/0x2c0 [ 1374.295721] __x64_sys_splice+0x2b5/0x320 [ 1374.299863] do_syscall_64+0xf9/0x620 [ 1374.303660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.308844] RIP: 0033:0x45c849 [ 1374.312020] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1374.330905] RSP: 002b:00007ff69b0d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1374.338597] RAX: ffffffffffffffda RBX: 00007ff69b0d86d4 RCX: 000000000045c849 [ 1374.345851] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000005 [ 1374.353104] RBP: 000000000076bfa0 R08: 000000000004ffe0 R09: 0000000000000000 [ 1374.360406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 1374.367662] R13: 0000000000000b9e R14: 00000000004ce6a2 R15: 0000000000000000 [ 1374.379392] Mem-Info: [ 1374.381841] active_anon:309332 inactive_anon:284 isolated_anon:0 [ 1374.381841] active_file:9179 inactive_file:41891 isolated_file:0 [ 1374.381841] unevictable:0 dirty:128 writeback:0 unstable:0 [ 1374.381841] slab_reclaimable:16835 slab_unreclaimable:130769 [ 1374.381841] mapped:60859 shmem:341 pagetables:3234 bounce:0 [ 1374.381841] free:1013728 free_pcp:588 free_cma:0 [ 1374.416085] Node 0 active_anon:1237328kB inactive_anon:1136kB active_file:36576kB inactive_file:167564kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:243436kB dirty:512kB writeback:0kB shmem:1364kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 772096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1374.444644] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1374.470684] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1374.496907] lowmem_reserve[]: 0 2533 2535 2535 2535 [ 1374.501943] Node 0 DMA32 free:258208kB min:36064kB low:45080kB high:54096kB active_anon:1237328kB inactive_anon:1136kB active_file:36576kB inactive_file:167564kB unevictable:0kB writepending:512kB present:3129332kB managed:2597388kB mlocked:0kB kernel_stack:9856kB pagetables:12936kB bounce:0kB free_pcp:2336kB local_pcp:1428kB free_cma:0kB [ 1374.532852] lowmem_reserve[]: 0 0 1 1 1 [ 1374.536901] Node 0 Normal free:8kB min:24kB low:28kB high:32kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1374.562743] lowmem_reserve[]: 0 0 0 0 0 [ 1374.566825] Node 1 Normal free:3780788kB min:53796kB low:67244kB high:80692kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870168kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1374.594498] lowmem_reserve[]: 0 0 0 0 0 [ 1374.598491] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1374.612127] Node 0 DMA32: 803*4kB (UME) 234*8kB (UME) 123*16kB (UME) 204*32kB (UME) 307*64kB (UME) 114*128kB (UME) 74*256kB (UME) 40*512kB (UME) 13*1024kB (UM) 3*2048kB (UME) 37*4096kB (M) = 258252kB [ 1374.630109] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 1374.641169] Node 1 Normal: 75*4kB (UE) 249*8kB (UE) 276*16kB (UME) 50*32kB (U) 19*64kB (UM) 7*128kB (U) 8*256kB (UME) 6*512kB (UME) 3*1024kB (UM) 1*2048kB (U) 918*4096kB (M) = 3780788kB [ 1374.658479] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1374.667400] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1374.676026] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1374.684904] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1374.693475] 51409 total pagecache pages [ 1374.697515] 0 pages in swap cache [ 1374.700963] Swap cache stats: add 0, delete 0, find 0/0 [ 1374.706358] Free swap = 0kB [ 1374.709366] Total swap = 0kB [ 1374.712363] 1965979 pages RAM 14:16:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:16:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80045440, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b36, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000004c0)) 14:16:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x4503}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1374.715518] 0 pages HighMem/MovableOnly [ 1374.719504] 344636 pages reserved [ 1374.722934] 0 pages cma reserved 14:16:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) bind$l2tp(r1, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) ioctl$TIOCSTI(r0, 0x5412, 0x8) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000040)) 14:16:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80086601, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b37, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x2) 14:16:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80087601, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0xfb, 0x3, 0x0, 0x2, 0x8, 0x2, 0x6, 0x4, 0x3c2, 0x40, 0x3be, 0x10001, 0xf35b, 0x38, 0x2, 0x2, 0x7fff}, [{0x6, 0x4, 0x637e, 0x4, 0x81, 0x9, 0x0, 0x6}], "257544796a88c7c338dad159", [[], [], []]}, 0x384) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3c, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888b09a066e7a5e618f0184859f4060e4c54400200a0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce56f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba572f1d1fabeb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee010000006dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e141388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe300"}) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp1\x00', 0x701300, 0x0) 14:16:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x3) 14:16:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000040)={0x7, 0x9, [0xfb4, 0x0, 0x55e, 0x4230, 0xc540], 0x5}) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) 14:16:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b40, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840)=0x0, &(0x7f0000000880)=0x4) r4 = socket$inet(0x2, 0x3, 0x33) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r5, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r5, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r6, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000b00)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000dc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b40)=@acquire={0x21c, 0x17, 0x10, 0x70bd28, 0x25dfdbfe, {{@in6=@mcast2, 0x4d5, 0x6c}, @in6=@loopback, {@in6=@local, @in=@empty, 0x4e20, 0x1, 0x4e20, 0x100, 0xa, 0x20, 0x80, 0xe32040cbf3478e03, r3, r6}, {{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x2, 0x4e23, 0x1, 0x0, 0x20, 0x0, 0x87, r8, r9}, {0xf9, 0x2, 0x68d, 0x9, 0x4, 0xa6, 0x4, 0x9}, {0x20, 0xffff, 0x6, 0x4}, 0x81, 0x0, 0x2, 0x1, 0x3, 0x3}, 0x10, 0x1, 0x200, 0x70bd26}, [@algo_auth={0x56, 0x1, {{'sha384\x00'}, 0x70, "4f51e709212fc116d9acb56c2c9e"}}, @algo_auth={0x48, 0x1, {{'crc32c-generic\x00'}}}, @algo_auth={0x4c, 0x1, {{'rmd160-generic\x00'}, 0x20, 'aDZ\r'}}, @replay_thresh={0x8, 0xb, 0xd487}]}, 0x21c}, 0x1, 0x0, 0x0, 0x20000}, 0x8080) r10 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) write$binfmt_elf64(r10, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x78, 0xe2, 0x6, 0x6, 0x6, 0x2, 0x3e, 0x1, 0x1dc, 0x40, 0x1f4, 0x0, 0x7, 0x38, 0x1, 0x20, 0x8000, 0x80}, [{0x3, 0x3f, 0x7, 0x7f, 0x100000001, 0x4, 0x80000001, 0xff}, {0x4, 0x2, 0x7fffffff, 0xf543, 0x1, 0x80, 0x0, 0x7fffffff}], "d0c14077dd6ab4cf3d5320577d9ed7397e0d8ad192eea1605acb20b1e4ae939b746892cc3c071d54ce4e0f5560d8565096aff9d4abe5fc3857bc5948fe5cfd74949a80f332894ea18129b6d6d5bc22bbce717035148ed20d690ebdf4311b95ffa96a8b2cc825585d328edb6d9660743d17dee588cac570c2f57abcf694f43bd53d3229af2f732a6f7591b72724feb4f59e34bf0038e77f389f5787e569b99fc0c1c2b0e48ef139e4380125864743dff469623294", [[], []]}, 0x364) [ 1376.813232] hfs: uid requires an argument [ 1376.826588] hfs: unable to parse mount options [ 1376.864489] ipt_CLUSTERIP: Please specify destination IP [ 1376.888956] hfs: uid requires an argument [ 1376.899780] hfs: unable to parse mount options [ 1376.936149] ipt_CLUSTERIP: Please specify destination IP 14:16:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b41, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf) 14:16:29 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000500)="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"}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101001) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8800, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f00000004c0)=0x7405c10) 14:16:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b44, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x3e, 0x0, 0x0}) 14:16:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840)=0x0, &(0x7f0000000880)=0x4) r4 = socket$inet(0x2, 0x3, 0x33) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r5, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r5, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r6, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000b00)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000dc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b40)=@acquire={0x21c, 0x17, 0x10, 0x70bd28, 0x25dfdbfe, {{@in6=@mcast2, 0x4d5, 0x6c}, @in6=@loopback, {@in6=@local, @in=@empty, 0x4e20, 0x1, 0x4e20, 0x100, 0xa, 0x20, 0x80, 0xe32040cbf3478e03, r3, r6}, {{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x2, 0x4e23, 0x1, 0x0, 0x20, 0x0, 0x87, r8, r9}, {0xf9, 0x2, 0x68d, 0x9, 0x4, 0xa6, 0x4, 0x9}, {0x20, 0xffff, 0x6, 0x4}, 0x81, 0x0, 0x2, 0x1, 0x3, 0x3}, 0x10, 0x1, 0x200, 0x70bd26}, [@algo_auth={0x56, 0x1, {{'sha384\x00'}, 0x70, "4f51e709212fc116d9acb56c2c9e"}}, @algo_auth={0x48, 0x1, {{'crc32c-generic\x00'}}}, @algo_auth={0x4c, 0x1, {{'rmd160-generic\x00'}, 0x20, 'aDZ\r'}}, @replay_thresh={0x8, 0xb, 0xd487}]}, 0x21c}, 0x1, 0x0, 0x0, 0x20000}, 0x8080) r10 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) write$binfmt_elf64(r10, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x78, 0xe2, 0x6, 0x6, 0x6, 0x2, 0x3e, 0x1, 0x1dc, 0x40, 0x1f4, 0x0, 0x7, 0x38, 0x1, 0x20, 0x8000, 0x80}, [{0x3, 0x3f, 0x7, 0x7f, 0x100000001, 0x4, 0x80000001, 0xff}, {0x4, 0x2, 0x7fffffff, 0xf543, 0x1, 0x80, 0x0, 0x7fffffff}], "d0c14077dd6ab4cf3d5320577d9ed7397e0d8ad192eea1605acb20b1e4ae939b746892cc3c071d54ce4e0f5560d8565096aff9d4abe5fc3857bc5948fe5cfd74949a80f332894ea18129b6d6d5bc22bbce717035148ed20d690ebdf4311b95ffa96a8b2cc825585d328edb6d9660743d17dee588cac570c2f57abcf694f43bd53d3229af2f732a6f7591b72724feb4f59e34bf0038e77f389f5787e569b99fc0c1c2b0e48ef139e4380125864743dff469623294", [[], []]}, 0x364) [ 1377.775440] hfs: uid requires an argument [ 1377.782125] hfs: unable to parse mount options [ 1377.802807] ipt_CLUSTERIP: Please specify destination IP 14:16:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xe0) 14:16:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x3e00, 0x0, 0x0}) 14:16:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840)=0x0, &(0x7f0000000880)=0x4) r4 = socket$inet(0x2, 0x3, 0x33) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r5, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r5, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r6, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000b00)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000dc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b40)=@acquire={0x21c, 0x17, 0x10, 0x70bd28, 0x25dfdbfe, {{@in6=@mcast2, 0x4d5, 0x6c}, @in6=@loopback, {@in6=@local, @in=@empty, 0x4e20, 0x1, 0x4e20, 0x100, 0xa, 0x20, 0x80, 0xe32040cbf3478e03, r3, r6}, {{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x2, 0x4e23, 0x1, 0x0, 0x20, 0x0, 0x87, r8, r9}, {0xf9, 0x2, 0x68d, 0x9, 0x4, 0xa6, 0x4, 0x9}, {0x20, 0xffff, 0x6, 0x4}, 0x81, 0x0, 0x2, 0x1, 0x3, 0x3}, 0x10, 0x1, 0x200, 0x70bd26}, [@algo_auth={0x56, 0x1, {{'sha384\x00'}, 0x70, "4f51e709212fc116d9acb56c2c9e"}}, @algo_auth={0x48, 0x1, {{'crc32c-generic\x00'}}}, @algo_auth={0x4c, 0x1, {{'rmd160-generic\x00'}, 0x20, 'aDZ\r'}}, @replay_thresh={0x8, 0xb, 0xd487}]}, 0x21c}, 0x1, 0x0, 0x0, 0x20000}, 0x8080) r10 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) write$binfmt_elf64(r10, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x78, 0xe2, 0x6, 0x6, 0x6, 0x2, 0x3e, 0x1, 0x1dc, 0x40, 0x1f4, 0x0, 0x7, 0x38, 0x1, 0x20, 0x8000, 0x80}, [{0x3, 0x3f, 0x7, 0x7f, 0x100000001, 0x4, 0x80000001, 0xff}, {0x4, 0x2, 0x7fffffff, 0xf543, 0x1, 0x80, 0x0, 0x7fffffff}], "d0c14077dd6ab4cf3d5320577d9ed7397e0d8ad192eea1605acb20b1e4ae939b746892cc3c071d54ce4e0f5560d8565096aff9d4abe5fc3857bc5948fe5cfd74949a80f332894ea18129b6d6d5bc22bbce717035148ed20d690ebdf4311b95ffa96a8b2cc825585d328edb6d9660743d17dee588cac570c2f57abcf694f43bd53d3229af2f732a6f7591b72724feb4f59e34bf0038e77f389f5787e569b99fc0c1c2b0e48ef139e4380125864743dff469623294", [[], []]}, 0x364) 14:16:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1378.391958] hfs: uid requires an argument 14:16:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1378.419267] hfs: unable to parse mount options [ 1378.483451] ipt_CLUSTERIP: Please specify destination IP 14:16:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b48, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf0) 14:16:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840)=0x0, &(0x7f0000000880)=0x4) r4 = socket$inet(0x2, 0x3, 0x33) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r5, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r5, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r6, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000b00)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000dc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b40)=@acquire={0x21c, 0x17, 0x10, 0x70bd28, 0x25dfdbfe, {{@in6=@mcast2, 0x4d5, 0x6c}, @in6=@loopback, {@in6=@local, @in=@empty, 0x4e20, 0x1, 0x4e20, 0x100, 0xa, 0x20, 0x80, 0xe32040cbf3478e03, r3, r6}, {{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x2, 0x4e23, 0x1, 0x0, 0x20, 0x0, 0x87, r8, r9}, {0xf9, 0x2, 0x68d, 0x9, 0x4, 0xa6, 0x4, 0x9}, {0x20, 0xffff, 0x6, 0x4}, 0x81, 0x0, 0x2, 0x1, 0x3, 0x3}, 0x10, 0x1, 0x200, 0x70bd26}, [@algo_auth={0x56, 0x1, {{'sha384\x00'}, 0x70, "4f51e709212fc116d9acb56c2c9e"}}, @algo_auth={0x48, 0x1, {{'crc32c-generic\x00'}}}, @algo_auth={0x4c, 0x1, {{'rmd160-generic\x00'}, 0x20, 'aDZ\r'}}, @replay_thresh={0x8, 0xb, 0xd487}]}, 0x21c}, 0x1, 0x0, 0x0, 0x20000}, 0x8080) r10 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) write$binfmt_elf64(r10, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x78, 0xe2, 0x6, 0x6, 0x6, 0x2, 0x3e, 0x1, 0x1dc, 0x40, 0x1f4, 0x0, 0x7, 0x38, 0x1, 0x20, 0x8000, 0x80}, [{0x3, 0x3f, 0x7, 0x7f, 0x100000001, 0x4, 0x80000001, 0xff}, {0x4, 0x2, 0x7fffffff, 0xf543, 0x1, 0x80, 0x0, 0x7fffffff}], "d0c14077dd6ab4cf3d5320577d9ed7397e0d8ad192eea1605acb20b1e4ae939b746892cc3c071d54ce4e0f5560d8565096aff9d4abe5fc3857bc5948fe5cfd74949a80f332894ea18129b6d6d5bc22bbce717035148ed20d690ebdf4311b95ffa96a8b2cc825585d328edb6d9660743d17dee588cac570c2f57abcf694f43bd53d3229af2f732a6f7591b72724feb4f59e34bf0038e77f389f5787e569b99fc0c1c2b0e48ef139e4380125864743dff469623294", [[], []]}, 0x364) 14:16:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x3e, 0x0}) 14:16:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x3e00, 0x0}) [ 1379.275514] hfs: uid requires an argument [ 1379.329118] hfs: unable to parse mount options [ 1379.356511] ipt_CLUSTERIP: Please specify destination IP 14:16:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:31 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x300) 14:16:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840)=0x0, &(0x7f0000000880)=0x4) r4 = socket$inet(0x2, 0x3, 0x33) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r5, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r5, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r6, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000b00)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000dc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000b40)=@acquire={0x21c, 0x17, 0x10, 0x70bd28, 0x25dfdbfe, {{@in6=@mcast2, 0x4d5, 0x6c}, @in6=@loopback, {@in6=@local, @in=@empty, 0x4e20, 0x1, 0x4e20, 0x100, 0xa, 0x20, 0x80, 0xe32040cbf3478e03, r3, r6}, {{@in=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x2, 0x4e23, 0x1, 0x0, 0x20, 0x0, 0x87, r8, r9}, {0xf9, 0x2, 0x68d, 0x9, 0x4, 0xa6, 0x4, 0x9}, {0x20, 0xffff, 0x6, 0x4}, 0x81, 0x0, 0x2, 0x1, 0x3, 0x3}, 0x10, 0x1, 0x200, 0x70bd26}, [@algo_auth={0x56, 0x1, {{'sha384\x00'}, 0x70, "4f51e709212fc116d9acb56c2c9e"}}, @algo_auth={0x48, 0x1, {{'crc32c-generic\x00'}}}, @algo_auth={0x4c, 0x1, {{'rmd160-generic\x00'}, 0x20, 'aDZ\r'}}, @replay_thresh={0x8, 0xb, 0xd487}]}, 0x21c}, 0x1, 0x0, 0x0, 0x20000}, 0x8080) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:32 executing program 2: r0 = open(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="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") r2 = creat(&(0x7f0000000000)='./file0\x00', 0x144) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000040)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) syz_open_dev$tty1(0xc, 0x4, 0x1) 14:16:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4c, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1380.224563] hfs: uid requires an argument 14:16:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1380.252602] hfs: unable to parse mount options [ 1380.282593] ipt_CLUSTERIP: Please specify destination IP 14:16:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4e, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {0x0, 0x0, 0x0, 0x0, 0x800000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xc8ba}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x40}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000006c40)={0xffffff00, 0x4, 0x7ff}) sendmmsg$sock(r1, &(0x7f00000072c0)=[{{&(0x7f0000000040)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="e77976c2a4ae37b263aea8ae8f8f3dfaa4b7f61eebea56f229e3f349044754dc5582683f6335d4539dedba20c2211a9c085dfc30189334190273af2bfd79f3c506f706d59953931e7467eaf7862274c1cb178c6745f2ccec022259cecd492078d9057b4652ed5e27afe1ec9bf57756", 0x6f}], 0x1, &(0x7f0000000180)=[@mark={{0x14, 0x1, 0x24, 0x1}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="a9b5d9ba73d700a1cec9bbe96458f61dae19e11a73e14fbba8ac546b94f77b99225361aadf1f22d054a07cff7f8354715f71f68dbd9e5b31ee5629c221bdac349968966911ec82e32221cc7f1ac6a0f1e322ca402e76830d6c7050e5a4b70d0f8b3ef4e15df49484e7519c3666ea2df04f56b9cfff18dfbc221e21b14d458364a6d9219d935b4f5d387c800e002b122afd65fe86c793ab4b3950c1eb3daf03fc7b1047", 0xa3}, {&(0x7f0000001280)="db48b055bc5b9d766ad75721394bdabbf46b0a19e9a9dd2136adf946ab7e89c95779e88f8e2daa4850ae6c7dcc0124ad6362db404f91c4c76addf79c596d44e1c7a2b1608ebee7b5d9b38a8b8c4f77e27d60968ee7a2624499558c6abb68e3c7a615b59ef19c6634d82a7b3354b76c84bb1809f312cb3f072e466357db82234ec275a7507c621ddfe2e3fda887025b3683ea9c04218339149b4a86027b5ac3c0e42c6c568435bfb23652c03deed312e715bb1ed2f377a9dcb58c6bd4b41f56b964ab871bac", 0xc5}, {&(0x7f0000001380)="9bbd7ecb035f8636ccbf111a167197aa52e4e1adb8cf4b3fee2dc8c8959647a3499a1a3513dc5659feca93a2951b3b77ea639fe5f7d9fbc7b9b3aa4b27857d272ece4915d338f176f365c344ae1c2f7e5b23f6ec7f43011eac2840c4c46b5c23a976ebcd03079be0fe464a35533cc7a89600c68ed429a5dbe5d43ab0c5da4803f5b960dc38236fb75f477eec61fc2f63ec7be0314107ce836c496892fc9b5574832b05e41613869a43cf84fd8ac269d69e875b63dda980495901038c82ec12a46a", 0xc1}], 0x4, &(0x7f00000014c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6dbd2917}}, @mark={{0x14, 0x1, 0x24, 0x401}}, @txtime={{0x18, 0x1, 0x3d, 0x2a1}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x10}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0xd8}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="ef2801a5750d57dc8641e9665abe11e075e27ea80621608e1a95f4eb1bb256d83a766da670dc84f28ab653f3d7e302b09f25c8d93c20eb6022afe1db69ce866a25254f7ed52523fb31cb3c8a36", 0x4d}, {&(0x7f0000001640)="f7312d86fbdab7607b15075d6eaa79b0bb7e5ce0dace46617511b1e088504f0c6b9763eb3e36c2cb435368d9d29366c5149bbd50271f24fc9b02894cff", 0x3d}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="5b88757f473fa9", 0x7}], 0x4, &(0x7f0000002700)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}], 0x78}}, {{&(0x7f0000002780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x3, 0x1, 0x3, {0xa, 0x4e24, 0x9, @local, 0x3}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002800)="acf9d343b943d3bf5c1c5af28bf30067fbc16632b5c0e8bed301e4c45eeb4d901dc2697d9ae6559d577fb89b954b32c5a5932b93b9495b1573cf01f4585b12cfb5d6a0f0e681723283bc4dbe3747b08e53971da0c156dbea1813a5a319a784d65fa48362375da9525a787b73ab4815522dd5c3383713da093c957cf0464fb0579b57d019ac5b076202aa9239d7960fd0fdea872cd723317b60a957aaf727577f54f896b0ea73dee2e4cc15bcf2ff72e88f9f8da69b255c9cb8b82ebdd11b6bfa8cb05f6b9e19bb15dc464f5d61c77b847d84db4a", 0xd4}, {&(0x7f0000002900)="7c39beaa19c647803b96f2d7f906260d3f5963e0775bdbc860dce3e9d2d0e4ac980b374351", 0x25}, {&(0x7f0000002940)="bbac56db339a19edd9f26b18a8a0b96382b417c5adb1d8af75370867f5b582cbe12a3169a6a152a8390cdfb3ba10bcecff6d98a74b2e2abb3131fd7d5924fd5ee41523ebe26675a8ebce845c3520bebbca505aef46c65a78100002f4c9df7560d6e98674f80367cd4aa6c1f9a63b9eb2752e3231d5442ad21c8f", 0x7a}, {&(0x7f00000029c0)="61dd74e34e0b14badcccead321a0be3c8562477aa4fc8b4060d93e2e1e2971ccb1b87f17f24627965744fb907566c78e0dd80c3d7edda240e1b5654ef1abce7da412d59e0050d8", 0x47}, {&(0x7f0000002a40)="2ed082cb709afcac2c20a29e9d65ba945169d266688632495c71f576fcaa1f84c12f8316", 0x24}, {&(0x7f0000002a80)="dc757d322cf4e0ff07dd5b", 0xb}, {&(0x7f0000002ac0)="f00492e324e9526230117985366c65d3f20d280a04f2a236335fa20b4c7ad0fa63e3a03da16457fa2cfefdfc8e61ff5b97025bc90ff2831d02c44e4e3848e5895f3ca260f7c83f48bcd4cb13d796618d8d70846d91bc", 0x56}, {&(0x7f0000002b40)="add2ef91a219", 0x6}], 0x8, &(0x7f0000002c00)=[@txtime={{0x18, 0x1, 0x3d, 0x2cc3}}], 0x18}}, {{&(0x7f0000002c40)=@generic={0x9, "984fb82ab9ec26a14c8a855791882ecf3798afccbb9ac8299b4716919394a31977799ece0437e15da3229516989732fd5144ed71c2d30cc1ea6be7a8146147d3af10e6e9ec332f13a41b0ae13591ae6be20240d99d8a08bfc66d1f79c5b9650274c48910bc382e6b66ffbcb6e9ad04c87872b74ac1c2f75413659f401c41"}, 0x80, &(0x7f0000005140)=[{&(0x7f0000002cc0)="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", 0x1000}, {&(0x7f0000003cc0)="c2233c6b2ce50e93f8882c888cc756589aec56c9bcc9907d0655855c7d93e4b6376e42c86fbcd38cf74a4868f18603b847d955cc27448cabb2407dd8fdb01c951e5d2c59c84e62659db6f5e2cf4e98caeb538e9008b8179f86249bec270011774f977047fcacd6800d71b6fdc49a5dfd0256d6ea8a30fd648211e7b4e8d781a46530283c45c02f5fec691da2a9f1ba14c7f68769dcdef19236099f2e029ba6c3a1fb85b733c42ff0ef67421ca50577fd7e436d8a92aff28babf849dc1ae33f896caf62904c71556c9e5b027981fd453b382ff9561491d865ac954760a4cb4c4cd4c7005a02e3c0bc96d1885191377eae5c64", 0xf2}, {&(0x7f0000003dc0)="263457dc3a792999f3017b7f67b9c5e937fecd03c01340fa56e376a8d3617d8d77e8fc9cb8fc1acd410bdad4d6d2059b38483aff644fc052dc26467fd43b015d30e2ed1db53e731137ce000ecb07bff3f4533b3c672fd7f30ccc27a1744613829026e73ab68ecd958e6c1f93d9b153aba3ee4d5c7aded33bb1cf32e107567470689967b96e55cefbb1770224ab5d9a1ca093f10c7545213f52f5a4223bfc8e4428943cdab4f2edc647f14a5a3c23d14f43674904423874d2c1cce7f0cf8580693794e6706276a39d6f146887d4090e2256a118d0aa24b89477a366ae61335866baf7eba9", 0xe4}, {&(0x7f0000003ec0)="76121ad5b337dc13f4d2820604a645ab15ab0f7d60bdc84dda7fc33447d471b58f7374217bc1cb7b059001566790462eadee4b86c6125a832d7e16de08f47e957bec9418680e1a6a46141fb890e111b07a1e090762ac1e68a1100aedae74897ee6b5fc1f8ef5a58a900a09367f87ead1e6c211945029c8af1703ef47a581b355f846fe8f4bdedf72f890231f70673f1b94ebe7060be9a36e1d3c20f5a2e2d75c671f6707a024cfc53043f490b201d74655ff6abedc797784dea94b4631894e43d2", 0xc1}, {&(0x7f0000003fc0)="014e94c5dda68d31f3cf97c23b5f12dd9de8cc2c8a67e2ee6e9f2f5f75e4391b7f6116822c40b8a158265f3a3efb6d16bf5ebe933f1fba232ab75e0c90161b0896d79e78189619e454c66dfdb23026e1cb3ba0b9f2e565b80fa3d54747bb6fb179e675fc12096fb29c8af016bb0671f364e84c5d2af71bac4fb16d6012ed77b73529a3a6f482ebb53a0b6e0092c127cc4762652ffc1f7acb4dd741b57cc76adecf6206214b62cca0be36c61ab6646359840b8d8ab1c461e671f9b184c4e83e90fc0aeeb2e716d0f308b9c1aeabdcbda762ad5c6deae18cbfd76d810d5c9fc5bbdddeef3fa666771f5af2a229388e66e7dbdb262cf613311245f075e87e24ff7989e4386b7832e488ad6161414f9f83898848611655048ec8e8829c2c50a77ea5b64f3c78cf79b43f684d736b1145161a23d5d587eac5a7710fadf55becb5fd91c11cf9db34d310c6996fd99d5e85ba3d449365e3a1add3f39846b33345a37b801eef0df0fd5a2f69fb4818a70914a35f80fe66df34a6f0df15122d8e86cf6ff9c76df66eb3cc10eb56736902d7b553261968810960ec6d94808ecce412ac96db03247659017e257e71938356618c45cb9c98b0e1a00f9614752feb558e2a85de1b4f87921ab21bc976b7275f720f6e05a3568d1c30fdf5d9e8864e3d9a3ff425b57d17a281099a1ca0e81efc2b66a72868fb47904fb1542594e47189de35adf4dc8165b636004ab19a30c15cab90b94fa25293506f687a8a0961b75a884e2ece6767ba5aa77923ff2f289d311837ae8a8f59bd5ab4ef6e57213fa9da8b784cb73ff29b06cadf565973e7f34b5a5674da0b39a1d8857f194250e8b2acf84699bc8bd959438a2edfc6c23008ef9357801969eb1b9857df489e092aa78d8c433022c09780931fed474806744c6c89f3e52e578601368d6ef03aa3b57ff918f2beeafdb8e19a9f79d0c25aed8c7e15398e6117a4dd693f6637352246dbcb12d03dbeb11194c3ea10c1329e6646a75c001deac767adb28a355e6a7ae4173a4ceac6a42e46fc829e1bb22fe45686e1ffc20c3b881aac14c1fcd4e8f4e29e9ac49644768a6f1c93f21b51125c5bff27ed428f32006a0c167b98e6bbaa4bb48644ea21b55a91047b673f5c8244cb0f623645f5917bc3d5a53c3338fa6cb135fad1def38c697e9864c02c0fc949c468e268f15f2893651e911afcf29c4ae9d071705ad0febe44a5190a6907c6a3b22a024b7bcf2105edefaf4718f7c7485f5d599712fd3768a663ea110b1fb0eb7c96b8d3a35e53f8961e6b59c75f57f5fcd038228785a74a506135099d3489a97c53de7fd330027d639b8248726d69080e21d12290b9ac512594dac36fd0327d3aeee4dfb530bebd17f1c969daf0d745ccf4cc76cbf9e558bed5617f9a21b5dde4e6efefa010e00caf505d6f0cb032beb13b988e959d0f5fff74ae92e77a467b773800270961e10f3b50bda2892fc74248b18d527321ab8188fd26c996615d72d2ab2695b3efc40be8ad35785c1944089309aaa22b6bab0f936656aed750d9e38aad616078065b88b00fe7151451a4adba4d471816e63ca9f91c559164ad8ccc0c467c0129a973505295148284f411285a0cb2507a4a3789bf4897286a1726f0e6907590469c8c90260018da806240ef955621311f5a9d45939de94baf21d23fe9472b8f966191e0eb28e7b522df85725c294b251890bcdcd6a625b12739309911feb428a3a923986cbdebba0b0dd95d25c87a280fd7f1553eab10b6b023f64c91387dc05bfa506b59f463cf6fd5c46b5ddefee2ae8a0e98ee4aefd740ce0b204a3051d11df7b5b43d68b314c91d9c8c56434bd064c713f2a3fe3bce64bcce2d89ef0d8d6f5de9122e3a875c2701dc418a0cf7105c571d0a086a4c512b8cfe9b8f74086cae66f3c5bca8285283bf45bb812572f8a5ef91caa54302036727adfface23a89a748e7a6b51098ee772057d880928a6623de040455cdfc54de0638dc37bd43f7460cc6fb5e6485cb616584d725e0625383d2060b298ac144e949ac045778bf139147ed036424b8e53d4c6bbc0f5ab7855f9420d586053351bde983379c5e74c7f53a95aacb85ee3ea8ef828ff76a95c625da12c9fb56cef7d9bbf956f3de9b1e8663cf8774aa04d8150818f21cca5a05450344a1cd8ffd0004f97f41be3b5dd212b107723370926244a9d719421b52e18bca48da48182b22e4fc9bd77b3b22000122852be46d6716be3b019a225565d98754b5a7e88fba227ddddec1287afc98213c63cd5a66da58015e4aafd628039e0abec6f33a6a3b0fcdc93bbdf4814c7b5986fecc1b62e58c332e6af6b03a34aeab53c96fa3dcd92f50d4922a83a7273d55e7eaecb28a46596d230fcbe5e25f6e63f11b5a61b5135c1b3a480f858641da5adf5ab61b10a0d5968ef666519f90d5f9cdf1e720b9b61c93ca1877028b5ce02fd2e4726b9a88b745ce11dd434eaeef122cc455f263ad5856cfdf68206cfbdc63b26b38ca14314f591aab8fad140fbb7824a862255ef5b4f9e847013a4859f067d7e330cab44420e0896bdb6a0a607662cf8dde185922ba9c7443e818f644f68baf62b59734d33630be59c0a0f66332d8f278c3d6f5241839b58792d29f16c1d4d7c00f9c4b5f29f842483b9f275caa2330d452174a3d1a260c7f94df27fa2095c072035bee7e052d6a5592003f52b1436d79a2cb56314948015cf3e5bec8a30b9465f8aa2b3801302c161d367bb8849573f2f356fedc71e56bbe9e40ee4e0dd457b7d8028908961c61f6ca34f77ee6caebaafff91d1408fd448da3498c28381de074a7f7b8a72d3ceba399098df27fbf33d7393f67ee67be7eab499b8646f4fbd92823ba782e0ebedba7054982c07eae69bd94c38b591b98061e02076c27a10266270c87dd44330065a4575cf2cdb98587ad6a36fd05020963c10739dfd255b1f77959630697cba91e033a53aebd6ad09d795e0c662bacf229154c9e3b14ea95a77aec6ddbcd392151a8a45d2da55cc418798d9e9a4c632277830677fdf96f5c2ba208c3aaad81c3fd26c1b0320985eade9abb1c87116301c841d0cd234053d3c8985d10336def85499b7e494a984ff8c13c4e88644eb5de0fed3e973214dac0f9414d593056ded02f1b95c7438c59cb9b4af1423e99d55f581eeb4c8173d86dc9b8c562dfa94736673a3edd7d3ad48be74f1883d0e8f702cf15264131cb4867a91f8ac485c15c8ace4a912bfaf4a9e6173389d8cdd54a4907ea2d8c8b5d1a5e091fd8a56360f0a98f6d70a19742206ff44d47c63dfad7fd19dca6e2b9d2fc8c69f91804beb54bd01b410556e8cee482764c6cbc115fee9b898724a74e8a211c3bd543733db585c79db8c260aef68c0e3e0a9f4a6390c6226853e2ecb71e0c33a8494442e3ba2ced8e52ee10d8745b3ee909bb62e56449f607e53fb8f52894354c9332efefbe41215a88e1c7315518464b8c6e52344ca6a40ddc6e1e5f0c6c27b8d0d89ae78d46f7274b8d65f4dd370a954b5897964a7cea4fc4fbbdc16322193e9fa5e0c143c640b5ea1e2b9e32b645e76c831c9329f248935b20fca5214669f1dffa44bcd2182418ec4ba2f9b560bb599d7688a0f7a6c8486d8b807a08c9009df03613e164f2ab40d11f250a722806080819f6b96c5e343632b6fccacf5f01e39b45006e6b36c2a0b3e634d539923064a33980f32574c97c64dc8b9cddcabdaa9906e4ea201ec9428ed0a768cd398adacf99cecc584e8be5a0c02f884ff9f3354b927d8e96902bc6bfafd4ba70a393e0127f4248e5c490ae968ccde22e2652b7436dc2fab10d67fa4139ed755ff831aeab9f991b9cb06b37a7271ddb1bebbfc038fa4a1f6e6df84db1399cc3bbd085a0466f72e74ab0bd7b2dc38b5e633962ac9e0e0344180e7a1111752dc6474e01b4f9bb2df125458f8286b8426bf2067fde447cb78982ae3be411a46a95f51a07a53f685e9372b0281256847eb6d37659fda6f6a7df7ec8d6e3de34ce0cd3d4654a8e3275adb7c34ac92b1da098e3dff2bece6af9a000a2c56f751034369f5b4751fc1f16e8666d06d7c7f418ff1da03b4fee68bf414fb042140e8fd78045c3e2f13472d4b9346925b46f1a5b04832b42aab275fd2fbc01ddf855425771a9beed417d11cf776693aa086da269a7b7fd0d8df8173df793b6dfd1b3ec759cc7b19c9f23ff7e22e84c97ee1ee98778967c3407f11edd4fa0634e24f908d614682a29ca60835ddae690d64c2f9ef0bacfef79cee489522d13383f10693e9bffb9a2236b6800f4678e0e166051c96a565b7c9b95e6e8aaeb3347a018644de9978338520c4c97b1033027bb1752300477021cd3d87dda4fecd96ad873a0bb785ceede0ca4553e8df25c69179ade9bf5322fed1204f06ff4b874f77934e856bcd34f29c65e42ebfe22924936208f72b6557d084c264b41dce8018b85f3236aedcd5fd9fad9c67709b6e717f9b09f8e09df4a4660d228475338abdfa9f7d39425ce2d89344ac4a92e698df13810af520d27d1aaa289867e803bae28345defa177a239e762b1c6780a636c5d3243ad3f895266855c35a608ea9e40b28f25bfc55154b1215604a0bfea359d2c48efe42990260d5b5f745ddd11f46b125696fc0458615e63cf8b4e27d138f1a4e6d59d3721ca260c5a66d82afaa575f50857993e3fc94f8d2a46357f03469c9f7e473f8128058243f98a0696b71f7129746d50eff3c04787bc1947f0c19a9d97e505362b1adc96508baab35883a500d67b290f0c623c8130a10cbf1d6019fd0379ffed2ac1aed9ce070bdbf97581d1ce2d48c5fa07ab6f84ad8c8eaad44e99299ddb77a220c144b8d6a1cf6d56887ebdfbd7e46d9addb3af90ef059df50afcf5a9d514742d09ad1f4802b5bd492f0c5360ae21e389ac8318fc9fa99d67e7a8b400fb5207a094437537501986ba5a13ae7140d384c0ce16487790a87ac11e086666fe401bcad480f3cb09799defa7377b259e323c9b3ae5fb9ddd862c557787151ac43965ab0f5f6bf0c8a28c1e65eed1759ac212d3e87cc2ac7d66574ce3f20ce4274120b7d54683941b6412cea4aaebc3784f1696902fac0e5a0d64709daf4775a40b41a9c3afc056a1a39a1ed5d2dca84f44d22bd47fb9bcf3aba7c011b41636ccf27962bdb81cc587f46a0994609e1bde4cd7c245e72bda54a28cfda5a88de58078ca7109c7425c2b66de96adb8719c3e97f0fe0f9f505d2cdf5c5fb3f29658d973daa0cacac6b4815ef9566902752a922bd1477c32747d8bedb3e0dc794273ef20d83806b5cf3f47e0858569722da724663fd5006e3d4efdc8223ca1720d5e11cedd640a15761b9fd8fbb36dfeb15d399365e9f75db43e8fb2a8067c98708cd4f13f646ce48785245b076703a0bc730966b007e5f7c11cb741adef8bc2201523d94b653a6ed8f8528550f58d958132a3ed927568f79c8835db4f486cd1f3daa8a1e03ca3ec8f206b371f58dbaf06de71a863a207267e4ca4c875d21079b8b24587659c51e0d920951da54d3507bd6ed00b3143b14ae362fb07f8b1a633dfe55b6075dd4588e1b6e1ea59ac6ecf1dfb366f6b8ab991845ca41c287833459e77d36ab2cd945f2afb1084630260896dbf68e5d51621fa6bd2749fbf13546d7c7418bded80214a3a7f59856234b2aaa68a39e92783a88a625bcef1b4d41f9210091fc6860119b844de1e6a1fabbb5f6ee4437f69ba17baa666203ccd06af63a88672aec16f9716a6b7f44dfcd712cff91eaeb87aece784e1272fc1", 0x1000}, {&(0x7f0000004fc0)="b8a1b8c51106454a5a2e12363dfb0803", 0x10}, {&(0x7f0000005000)="e8a7991a7b83e568a0cd476ffef3fc8072beb766f65cc2a601d2caf780e8f6910ce53c1a219f896da7988d97e0f1cacb17d7547301731747ef30e7dac0e1ef5274585b4e19148d5787ec6a893f42ebe4aff0c2078935deffc70dd69d5b91f75735", 0x61}, {&(0x7f0000005080)="0cf1963bc345", 0x6}, {&(0x7f00000050c0)="b644c20677192f3979e726ff3e3afe4a10edeebba595864c4e1b1ea6b84574b777c03ab2e14892cf3dc0f3c7dea85374f2885ac1ef7f32674d258e22e68208dd3f902702035b304bebe78ec2ac88628c902f4ea110c495a16a1670", 0x5b}], 0x9, &(0x7f0000005200)=[@mark={{0x14, 0x1, 0x24, 0xdff}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x6e}}], 0x48}}, {{&(0x7f0000005280)=@isdn={0x22, 0x4, 0x81, 0x9, 0x57}, 0x80, &(0x7f00000058c0)=[{&(0x7f0000005300)="3d5fc51e05e606b388a92bda597a9c7b10984630c60ca42ff29e84419c81b46eb0503613d8a8afc4aa9b5259a9d9478ff074cb834c4aa9ffa925adc8aeff90379c64d431c7de396ac28fcf889d20729de1f7122cbfbd95bcf10ce0dcd8e2f81fc0", 0x61}, {&(0x7f0000005380)="42662bfe26bd14da1755426e4e6ca0f816ae9af29c120173e29d37a76294b66b6a192156b7c68cef75114b7803c333752042e767256fb13b4c057a7c74e59046e325f9ddb3a0bbfabf8f4f8653d7e4ba36ccc5bb490306797c92f1d8fb3bc6976e8d14c2d0478cabeb24bca72b0803b953dd58f5cb6526f5217d295c0a121f2d2d34412ef1b0e2c6842de6a48499a6f89fc31788dc8bedb708dde083f7df7dd2660a990b0413921abb8966be71477f8ba50600bff767c796f90436fce9f5dcc59980245fd558bec10fa330181737c3e4d4", 0xd1}, {&(0x7f0000005480)="6b628fa05581ec16890f2283fd38322ee0d0546f8b9c1048d9542ae5370d299498d4c50c83a523acd243dfbac5d93919a15aadad2448e0eb1b40e74e89a95c88c1ccbee7a50ed52a64e079863530d0397c09b99900797d28712dac8dc0dd1b946dffb5bdd74fd12c6755378bd06f5bfbf47cf69da6d544bc6859958109ebaf2ebbb268c9d15cebe07eaa0d56b03dd9b65284c74cd573eea81cbe413db09dc78ea9f647cbe6ea6fcc9519c3a84ed92aa611e90bde3a9635a01c45c40175bf037fefe477c16f", 0xc5}, {&(0x7f0000005580)="2dde5b9578d22b65ad6aaed33911bb20131fe1802e975584f392d63fa21e16f7eec0e9904f3ba76ad568254260cba188b4314df9e5cd0602cefc1dd85446ab56a652e907da12e94a5a9d0738ce2ed24159724ea8747edae9f209d809b6b7fd4da89e722fcc3ec1b23ec4af1e87202134451873a5c66a082bb8269b4a2fd9b6903c5154c0f6386e0724132668c0ec9ec69f2f63c5d0df307a5e2ad2679991b1198d455e746cfa48dd233c8752dd49edb3247981f649662b4c08d459cf809ef40531f72ad8e835e9d5ecd08d801f13ca394c1ea323054a2f76c9", 0xd9}, {&(0x7f0000005680)="e90c1a503cd329ac57d1f37f5436e6bcdc3162728fc88ee4eb36405016c22557e3b412a986ad8ba8276f9cb720aadf3751be5ef4b0129992623d8d7568b4e32a662be9b75bd9b6500e425926cc803ec1635ec541fff1793c6ea83073d0fc5d47c08927ac9bd45e7a2e26fbf7b3b1c3a2063beb30f04c4b89caf29ac5d647541015aeb2ca21d745b5b30d8adefc852394921c766f95272a1735cdfeb919055aa822bd1d0a2a22dd0d26", 0xa9}, {&(0x7f0000005740)="8476e7aaed60f1cec7ff36290835fed969b4b47ceaad0327d6c2b361fe030d114bb3995e04a9d98b6eb72b9681968fe1b2e9490bf801f6bff6033347d0827fcca6b6827e17608a10461846b48144bdaaa2abb7328ef43e2f1ac6a5d854d584ac7f82edf92367358c7ee961ea8a7266617e09f3bd0cae5ecac8c7545f53463235cd0c5fcc2d28717a031c2e9593d69e58698874b0943c9fdd9ebe6949cf3bf4dff92f00b89e54d306759d1767edd6d0031d144b24abd32b5a5bc39ac816984f415ddbdb97ddf52a44f160d6d43a32a5eadb2a723379a714190f4be1c35cf6", 0xde}, {&(0x7f0000005840)="841b8e21d0cfc5e90257734d08927e71d2c4c5b2a91465307eb87a52dd38d4213f48bb74c446d13b771cc2da2cec98db", 0x30}, {&(0x7f0000005880)="f099b69720b107103bf180587671ec82abbdee5c9a256b27dfd8ec001a23bc4f1602f7812ae1e6f8d54248cda66108d02c19363cd86aa9fab2d9ad", 0x3b}], 0x8}}, {{&(0x7f0000005940)=@in6={0xa, 0x4e21, 0x4, @remote, 0x80000000}, 0x80, &(0x7f0000006c00)=[{&(0x7f00000059c0)="8c75b78450e3d652ea878ad580c2d2dc5dcee4d2508a9e065cd107f96182434abe9dc57f933b0927dbe06b222ea2722ef417ca7cac8a28f60993c45f76ecfb42e16e94ffb1bd33f2d9eac5b8a510d99f496f39e155243903d127550e45bb23e9a885fe57e965038333bf4cf09fb1f17d08fd43d7e9c695bb62c4f2d89c", 0x7d}, {&(0x7f0000005a40)="dd4301ea6bc0fc14af82b90a872a9fa05366b6a62f5ffeaf94282477eb1356aabb2623835108d17e8708459c70e1a59af24ae9d623a0499e445677dccaa6e46b3bd203d6b757a0ca8101315d870f33dfda1e346ab6e9853eb74f6c8d718da954f91cc5d4fb62d3010a2b8e4924605eb577d0e47cb731aedaecef11499cb9c698c4e072eac8b6967245fe25225591a012de8a78c5969b966fb0ef316361ef7afd73de6473b40373e7", 0xa8}, {&(0x7f0000005b00)="feb9588677928e1f444b3af28ba5f241f53374bbb8e2765c88274f35df299788038e90b2a01a354418ab314021ebfd51fa4423f93b89d3e29f42d32e2cc1ddd5b3d80e827749fbcc318cb672634f61e7be6ba2ce20129cd4e130524e0a6bf60091b53b8395f2ad7ff5ca65effdcd4dd68d10fdc7b707413c86a94c7349d340fb4fd246d7f072d1be72c5aee4ac1664fe6fe061417b6e2c7c8fc0ffcabcd2befd8bf5d9f1c52f97c85a1ee8dbbc58a2d2002371128b532727c7e828bc490469f880f2a20b61cf4cfafea81da21bbc7ef0d41b", 0xd2}, {&(0x7f0000005c00)="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", 0x1000}], 0x4, &(0x7f0000006c40)}}, {{&(0x7f0000006c80)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x80, &(0x7f0000007180)=[{&(0x7f0000006d00)}, {&(0x7f0000006d40)="c447e4255d19", 0x6}, {&(0x7f0000006d80)="c6d7243c3e4cafa318b75e3a8972480e12316cd263f65a5ce8639dffeb1eb4d757319ee04e6825b095d5d89f52a4a42053d519cc845b809a8a67dd54cb5fd5bb602fa19bd0cb0149f5ab2cb4665f3883efa1f3daaa6a6be9c2c8e6439960d3e73f9954d36ba538572f70c56624eedd0ae164626c859dbc159d50fb40b275", 0x7e}, {&(0x7f0000006e00)="427497029db8b6dd661163e91218e18380092e6efb70d9906f232935eb8a9604074ac675e78bf99dd889e58f", 0x2c}, {&(0x7f0000006e40)="8725cecb5d9784d2ca559178114da9d6016e6361c0c0c37eb787c44cc54fda70da2025afd8f607e059c2e12b7e325c6b6e5a0a6a1c219a90f93dbe3e426b1f74efc478b97024d508d0206965b1101ff2dc44567e720aa2b839c22af1761720b3616e8959d45e662d6925087aadd330d00c44c01abc0e6b7c82819ed4bf0d4dbcafffd90d2b4a3b2f27a6c3e1dbb571cb65b67c8d9985f8075401663b791d62743f7e3fa9de70e1a4731edb3f90c0b66b563cd90733878b44316d65cd50b3582ce61acd431ac0e2d5f02c2ea11fdfce4e9e0e0463177a0836d040ef5b7763fe61d4bab00708815cd9595163ed5ebc5e39", 0xf0}, {&(0x7f0000006f40)="efb078f00889b76906468155e52c4e8f9eec66ebfee471ac42b2516800020320ea5b64afea669a6f3034dd3de92c7be00de60e9cca52e65f2ed2d1bcaf6bddad2b5315dcf176ae6aa643489b01611112e6e89f0dba9eb1ccf89667627548990ceb47b52c7aa580d8387cc3ee9e70ba12be8eed56cd9eb449010a17ed52c297e898afeac5816e4867f6456dd90c5270636222aafa942ffd9121b893178e01d56ac0c08a515fe22f0466425110977ba195cab59f4a40eb7a5f8025519c294b64ba7ef68e13fa5cd15964b1d8cfc99cc30f3dfe", 0xd2}, {&(0x7f0000007040)="a8cf6c51ec048aaf5e84fa1cab407178aac9cc8145c3002123b8db89bf9814929dad95baba4c1f5f90765681d30aca52858606c94d96404edbb7d87c591c61b3d06ffb02661a68957f8122fa4324be1b6ea9d7d0318f5b4965646fa58718794d3b61da22a53d776a2ba113e3ab9fc47931644a49", 0x74}, {&(0x7f00000074c0)="4030750c1b27c4ee6d6199d89f92cdde9f08acd788cd7499aa9327965b39eb58e99a16646982cc88f6d036f8ea85259aef0dd41cd27e516b0e5563010e50e488c773e847c08fb7ca1f444f73e528a2d847675cda7f83bd3af4d2ee3cd38cd80806537a8fdbe4969322804c95b6766243ecdcd12007d457578403156bd6974604fd98d5bd8fdd5cbb7c20644c0738e1a9db0d5dddcc4c690a66f547a32c5e39c139ae37912666e76f981e6eaba737b78f65d8", 0xb2}], 0x8, &(0x7f0000007200)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xfffffffe}}], 0x90}}], 0x8, 0x10) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf00) 14:16:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = socket$inet(0x2, 0x3, 0x33) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000b00)=0xe8) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:32 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) sendmsg$sock(r1, &(0x7f0000000540)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)="c539735bbe3b9757ef65e2ad53d5b56e7ee7400be36a1b6eb5bab8e5fd39bae50c25abe1d34915e90368970f477775d812bc1f05fcdbfab78c8c1072463db399c1cd1b59b9cc9e2636b8cd699e5e0405d981a8205391f76c8bd025b93cc7895c7286d17d5c01c1a220a49be997691db0100dfed3acb3fb5701c949f18c187c46950b4782ca56d65d9f2c8af16964d552b79d10ff83ed8c1525031bf569245d69f36c8e05e31764082597ef1d90e2eae11ae77f633eaa44fddf1399e8529ea1e490ea5ddb785c4d608716458a0ba599c1cb8fcaebfb257fdc841d88c3b44550ce65", 0xe1}], 0x1}, 0x800) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vcsu\x00', 0x40200, 0x0) getpeername$inet(r2, &(0x7f0000000680)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000040)={0x4, {{0x2, 0x4e21, @empty}}, 0x2, 0x4, [{{0x2, 0x4e24, @rand_addr=0x98cc}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e21, @multicast1}}]}, 0x290) 14:16:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b52, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b60, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1381.055830] ipt_CLUSTERIP: Please specify destination IP [ 1381.064854] hfs: uid requires an argument [ 1381.076069] hfs: unable to parse mount options [ 1381.087366] ipt_CLUSTERIP: Please specify destination IP 14:16:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0x1be, 0x3, 0x0}) [ 1381.146150] ipt_CLUSTERIP: Please specify destination IP 14:16:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = socket$inet(0x2, 0x3, 0x33) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) [ 1381.407364] hfs: uid requires an argument [ 1381.411673] hfs: unable to parse mount options [ 1381.446226] ipt_CLUSTERIP: Please specify destination IP 14:16:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf98) 14:16:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b61, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:33 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0xa0000000}) 14:16:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = socket$inet(0x2, 0x3, 0x33) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', '\x00'}) chmod(&(0x7f00000000c0)='./file0/file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, '-'}, {0x20, '\x00'}, {0x20, 'btrfs.'}, {0x20, 'btrfs.'}], 0xa, "f52b2fd1d5513e97f361e077574275faac11f818ac9908d5081570b10dbddd890c7af35ef825d8f72918844bae45fa2747c36044cc8af0073ce6904639d9dc64fe84e41206953b69b7e9f824286386a93e046d7d419a1d1d02b0ab6aab653e98fe0cc91c078497898862680f38414fdc37d9794e1e21aab16fa236744cb1ea94b01b3ad1114267c4c24da4df295129d9b28717b687e04f33ea7b06d812844105243eb8c7cbbee704c856899c161c0977f00042f70166838f0b4aa1f5a3eb42e7fe39fee2377b21c1b4cff91d21c57382076105796257a8f4c43f91df6f5bd2405ce9b05309d5ab4a081620d6b7de81bc1860e31d9d"}, 0x112) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x3, 0x400, 0x0}) 14:16:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b62, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1382.000668] hfs: uid requires an argument [ 1382.019567] hfs: unable to parse mount options 14:16:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1382.070154] ipt_CLUSTERIP: Please specify destination IP 14:16:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = socket$inet(0x2, 0x3, 0x33) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) [ 1382.331678] hfs: uid requires an argument [ 1382.331686] hfs: unable to parse mount options 14:16:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x1951) 14:16:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b63, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = socket$inet(0x2, 0x3, 0x33) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c00e19f9221804a0e242a05b97a10c19255"]) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:34 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b64, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x45030000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) [ 1382.869536] hfs: uid requires an argument [ 1382.887307] hfs: unable to parse mount options 14:16:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) r3 = socket$inet(0x2, 0x3, 0x33) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r4, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x3f00) 14:16:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b65, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:35 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0x8, "c33d10f59f3926e43119e28d12e4bea5ee10d091ebb5d9f3a4aa4439fd91fa4b64c936df90b83027645ea44188545cdab605983c98650bb4e2b8b99aa6bc1c8c426d48f875c332bcb47886756b7d6e1fa0f93c528095e0f9fafc411b0a35c97c1d4993d55a581cd389e57adc0506acd75249f955fd6458968ec1776fb98366725dda3eca7d292d524d3c0ee651759d95d4087ea211e59f1eaa65a9315f76252fc8d52f8b83012951194be86012d1f109a4585fbf34b737a47c1771ea64d9a9822dcd03c21320001ffe92a21e07b365586271663dc20c0379381815e0a6534d3fdd6fd988d93e49fd6e2f6cbb8f73208c11d2c2d32813be3067faa5934f2c7d06c9cfc9c6188e23db47256d9f15faa8bc04c5112c167b99ad28e4660e7e8e33c89611d18a0abeb459d7e515ae4226b3c9de4999ffb799443d6cbeaf29f632e87e09a239f4ab72c9c7c5c4c6eb68a580329cba8cb4e84b28bb7cfda3d731d10578f7cdfc2de1abbe551b8d70bee6706ef9fc02281fc4b0fb8e4da0e36410fdc7d15ae3e40008895c705d6b05e2d3706fb2e4ce7b0052b5e1e7ba00fcd565542aecb63a58774d19293e378b516f64850244307eddccd22086d8d181df4f36b4b5d26a14a8e00d109b992a1a9777cd01a2ae017583de8b8f383f46957e5fbc6310f1b7de2fd87114df39e6d54476ef4ee169157073fbbda1b53a9a6a420720d9bd32"}) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000002c0)={0x6, 0xfff, 0x25ef, 0x0, 0x200, 0x3}) 14:16:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) socket$inet(0x2, 0x3, 0x33) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r3, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x40, r3, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b66, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x9effffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) socket$inet(0x2, 0x3, 0x33) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x28, r3, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:35 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r3, 0x4b45, &(0x7f0000000040)={0x144, 0x18, 0x0}) 14:16:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x4000) 14:16:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b67, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:36 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fsetxattr(r1, &(0x7f0000000040)=@random={'system.', '\x00'}, &(0x7f0000000080)='posix_acl_accessvmnet0ppp00ppp1selinux*\x00', 0x28, 0x3) 14:16:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) socket$inet(0x2, 0x3, 0x33) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b68, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x9effffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:36 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000040)=""/130) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) socket$inet(0x2, 0x3, 0x33) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b69, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x5119) 14:16:37 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000840), &(0x7f0000000880)=0x4) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x3) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x315400) 14:16:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x980f) 14:16:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getuid() ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0xf, 0x0}) 14:16:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) r1 = open(0x0, 0xe1c0, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:38 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x14, r2, 0x20, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x50) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x1) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000000140)) 14:16:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="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"}) open(0x0, 0xe1c0, 0x8) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b70, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xe000) 14:16:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x8000c0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 14:16:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)="b5e6c25af6f309147a2ddae385530f981cc27a7a3e9f9d4a0c1238626fbbf3ecf50feecb383e98e0b2fb669d7acb2620946a5c80cb077c8abbce62aca2b46d2e9c534172dba1888a09a066e7a5e618f0184859f4060e4c544045cea0e3ea53316328a60abac5009d42505c091399152716ffe4c3ba7718799087b794d23d374042b4ab837788bcf73594f3e76c3f494878a8c270e141d0a992b0d442a0d92be2a5a6468c33ed06ae5ef20190975054a9db9397d1f00f0277c3a02519f76896c484e8806bfa7d5c67b2f218b2d450d1693632a43f53626ba3c88304cf92d2b964329fdef3716596ce1adeac3673f75ec656f203cd832fbbdb23aa836998a84a86d1747edefe0c6b808992ee18469a5b9eeefeb3324058673730e09f4b5c3c235ec39eb65004dfd81daa40964599d5297b6fdd7626b96f382989ada371eb134061b089d5574edb1558d2675af9ae7cb0fe16501bef10fa0677cfb6ce0c2e0ba5f67290b8beb94f0fac9823e42443620d53895cf6695096c008dadd5f3d14bbaad0474bfb014995df0a970d655d7ff10381d8bb3be3139a4d33c6c21ce142cd54a17b7b1b9b89af2b3632b0d24602989c7474f570816112e356eb1af84c3b316c97cfb6715eef4e2a9b37211c108e3871b92ec11f89fbcc7a1f47206d57a41f46cf84514cdf2fea7e994682ece0346e5b9b8035cb284b266a42818a9e2d5d776bd10f43829f5913e1481c1f9399e6fdcc88c34700314e5b53941b2ae540a1d2600c91dbfe88d7901811a288a24f76b17b000a7f6cfea9b5e6bd8c0afe2e7f1e9cb93acf318fee289dbfb6e301f8af99262c7c660a5d786222b66c79e8ac39c69e66e5d9aa11e34c0e80a4a9d771603da3c1b9ec0bf75e57991bbed18654df374e035378272fa8e9767304417bd9093bdb3e3ba3ccc709c51f9ad9fab90811ec1f9fd5192d16859b2457d42caac2c85abd6cea007021aad5036c7b0050b63156ca009d1bff2b461ab025a747230ce551588397b37adad508c7bb23efb5ee4dc578b36dda45967800ddfcb33a08d997ed68bf7746c22e20009411491ac58cb960510141c7c2ff1651d4c935821a367eb2214765a71472af5b8ba4e941388b027cc2507143b3fbaeaac2068734ddb9907233973f361a51ea4233e095a75735213015ae9fe873de644083019b39407225dee4f2ac3d9db5bfaa03c16a394d99a0fa1ff8a0fb45096ae3e3ac485a912f4795648d64980beb6a4a843f6143f5f691839b67606f3d10d73775445b5416202909b3bee0d99ee19ee012ff20a7b366ec4a9c8bc810fa1aa31f1df20233f46884c2eb36f0f0093d108c13f30ea239d8cd6d512ffca3932a70b9819c8f602594183fa9545c948550c106228a03068538c790229fce9216c36fb4135fc8884c34e05147506ea8bd5931c534a3bfd01b4aa7eb8fe3"}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) syz_open_dev$ptys(0xc, 0x3, 0x0) 14:16:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:39 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf000) 14:16:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4bfa, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:40 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x4a02) 14:16:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0x0, 0x0, 0x0}) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x4, 0x1, 0x1a2, &(0x7f0000000080)="2189ed43bc564f99e28107b19632d4a5fef7cc35232141c93352230ef7841fffc2e1021c986bdd84592e69dff00bf95ed4697180603d30a71fa8e8e1ff5341188f01564563e42166e799fa0eaedf3e15887868d959d4ba276ce9ba496c40fe57b5c3ab36ffc26374681a5c2cfdb4852222bc4e03a13085631f187f74d0e4227382c7972a3313b820933641617a90a8c29d2b440173d01d7f31b48d639a5654d31ce6bb2a93735a896139f42343a5563803495d87cb60dc117b5b29457623fe6d96c594d921c4e14c9b3067d7aa1d86b8d1e38617ca985aa2ac7c073e42c47f143461881154a5300fd48005542742a278e17cb1a8cd9b4b031b5dd7649ca3b32442685ca50fad32c5fde03c9c6ca08503eed19a059c654cb927c7b113332fc52ba4419749112eb08e651fdd6d06a303098df346323c1b65764ce51304a6b3a4d28f963c3b8f92fb425a95d0bdf9589daeb8aad45b4d5493c9c95ab4d2b0c00d302cb6e853d1244afe23db50f1ac743973bb9d1b011415a39d3c0cf947243e7132d8e1fb59beb0a0a12e8c36cb1a3155b36d16a122ff05895a1828386534e83700d759b590210feb6e79fc1843a92be63936548f49990c2025042c39d1af5c8ccb7c38a626dfe0f6d7b9cc53510d65dd3336795feda8cd05582809a104a82e4be3f7d020bdb6895150c28a74af0da05eac953a78637fa85d4753bbac2c3418d46c5f7e66d76605bc5d927778a4642a9bfcc2254bab3ab08e7b85e7c1f8193b6b9ebb9527d16023671f8e37fee38626d5dd04ceec10dcf92ed9194d64c0e203788e78bf5ca17e943be14fb85c1762230773c7b0a94d757f232b5a7a8b69444640be38a6ed91b29cee764bd00c4b0484650c27f9eb0c7412ee7e5146ea4875cc73fb55bdbab36df299fccca5ecea521e9c459b49625b96ee58c049166e361e5c4ae4b4c35b0406206b71f31236e74572fdc0793f330f65db36575834468583a7839bfde18b8f0cfd81893f60593786357faf88ca3b4857654315ef394024352fd960facea4930060ed988e6a6b1b9550f1e90e3bd2948ed30883044fee0e0661747a9251650cd6da32bf8148def0d18a51d8b6bc063138431638b9bbbdefc7629732c157ff6c701bfc29acedbe6b169ff43d8241acf16abac5139c957541a7053a093f8ddf40b50d0902591ea18b03847c590b2a68293dca98563f271cf9bb164849dc2455b8faa845200c9616f70aca4a2f90d2ab8af6fe56163dfce4407bcaaf094dbe42fd3a25a1539d2eb4f1eb78d501ef9bf0f7ced268e5e1dfaa939ef7f12cdcd884f1ee9231b35519d4678ebc0a038f881fa95999ea34cca7e4e6a752a32a7661930534b0da5933a825f3f9bd1b3e3918e39fa5af9bbd9539a77e75f76757918424faf9f70672a226045a568be246769bf0a3988aba06c0c7cf9f03cc51c8"}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) r3 = socket$inet(0x2, 0x3, 0x33) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@uid={'uid', 0x3d, r4}}]}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000480)={0x5, 0x7fff, {r2}, {r4}, 0x4, 0x10001}) 14:16:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:40 executing program 3: syz_open_dev$usbmon(0x0, 0x1, 0x4a02) 14:16:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 14:16:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4bfb, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x34000) 14:16:41 executing program 3: syz_open_dev$usbmon(0x0, 0x1, 0x4a02) 14:16:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xb0142, 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f00000000c0)={0x3, 0x3}) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'memory'}, {0x2b, 'memory'}, {0x2d, 'pids'}]}, 0x16) 14:16:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5409, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x540b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:41 executing program 3: syz_open_dev$usbmon(0x0, 0x1, 0x4a02) 14:16:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:41 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x400300) 14:16:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x540c, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x1e, 0x0}) 14:16:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:42 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) 14:16:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:42 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) 14:16:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x540d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0xfffffff, 0x100, 0x0, r0, 0x0, &(0x7f00000000c0)={0x9e0906, 0xc9, [], @p_u8=&(0x7f0000000080)=0xfb}}) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000140)={0x25}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r2, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000040)) 14:16:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x6b6b6b) 14:16:43 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) 14:16:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x540e, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:43 executing program 3 (fault-call:0 fault-nth:0): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x540f, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x2, 0x4, 0xcb, 0x5, 0x1000, 0x3ff, 0xb8e5}) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x2000, 0x0, 0x0}) [ 1391.591255] FAULT_INJECTION: forcing a failure. [ 1391.591255] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.617909] CPU: 1 PID: 30881 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1391.625820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.635183] Call Trace: [ 1391.637791] dump_stack+0x188/0x20d [ 1391.641438] should_fail.cold+0xa/0x1b [ 1391.645342] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.650469] __should_failslab+0x115/0x180 [ 1391.654715] should_failslab+0x5/0xf [ 1391.658525] kmem_cache_alloc+0x29f/0x710 [ 1391.662697] ? __mutex_unlock_slowpath+0xea/0x670 [ 1391.667553] getname_flags+0xd2/0x5b0 [ 1391.671373] do_sys_open+0x294/0x500 [ 1391.675107] ? filp_open+0x70/0x70 [ 1391.678671] ? __ia32_sys_clock_settime+0x260/0x260 [ 1391.683703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.688478] ? trace_hardirqs_off_caller+0x55/0x210 [ 1391.693508] ? do_syscall_64+0x21/0x620 [ 1391.697500] do_syscall_64+0xf9/0x620 [ 1391.701319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.706511] RIP: 0033:0x4165e1 [ 1391.709707] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1391.728615] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:16:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1391.736326] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1391.743597] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1391.750866] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1391.758133] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1391.765406] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000000 14:16:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf0ffff) 14:16:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5410, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:44 executing program 3 (fault-call:0 fault-nth:1): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x9) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x20, r3, 0x2468825185d9173d, 0x0, 0x0, {0x5}, [@NL80211_ATTR_WDEV={0xc}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x400, 0x70bd2a, 0x20, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xfff, 0x3}}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000001800)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)={0x2c, r6, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4048000) sendmsg$NLBL_CALIPSO_C_REMOVE(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x3c, r6, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2040011}, 0x8004000) sendmsg$NLBL_CALIPSO_C_ADD(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r6, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) [ 1392.440834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30901 comm=syz-executor.2 [ 1392.453654] FAULT_INJECTION: forcing a failure. [ 1392.453654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1392.465484] CPU: 0 PID: 30903 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1392.473367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.482724] Call Trace: [ 1392.485329] dump_stack+0x188/0x20d [ 1392.488979] should_fail.cold+0xa/0x1b [ 1392.492882] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1392.498003] ? mark_held_locks+0xf0/0xf0 [ 1392.502180] ? check_preemption_disabled+0x41/0x280 [ 1392.507206] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1392.511881] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1392.516903] ? fs_reclaim_acquire+0x10/0x10 [ 1392.521226] ? should_fail+0x142/0x7bc [ 1392.525124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1392.530236] cache_grow_begin+0x8e/0x8a0 [ 1392.534314] kmem_cache_alloc+0x648/0x710 [ 1392.538477] ? __mutex_unlock_slowpath+0xea/0x670 [ 1392.543329] getname_flags+0xd2/0x5b0 [ 1392.547139] do_sys_open+0x294/0x500 [ 1392.550862] ? filp_open+0x70/0x70 [ 1392.554410] ? __ia32_sys_clock_settime+0x260/0x260 [ 1392.559439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1392.564216] ? trace_hardirqs_off_caller+0x55/0x210 [ 1392.569237] ? do_syscall_64+0x21/0x620 [ 1392.573252] do_syscall_64+0xf9/0x620 [ 1392.577063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.582264] RIP: 0033:0x4165e1 14:16:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1392.585477] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1392.604491] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1392.612218] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1392.619491] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1392.626769] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1392.634039] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 14:16:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1392.641315] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000001 14:16:44 executing program 3 (fault-call:0 fault-nth:2): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1392.690065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=30911 comm=syz-executor.2 14:16:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1392.871869] FAULT_INJECTION: forcing a failure. [ 1392.871869] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.940111] CPU: 1 PID: 30922 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1392.948032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.957392] Call Trace: [ 1392.959997] dump_stack+0x188/0x20d [ 1392.963657] should_fail.cold+0xa/0x1b [ 1392.967560] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1392.972668] __should_failslab+0x115/0x180 [ 1392.976890] should_failslab+0x5/0xf [ 1392.980589] kmem_cache_alloc+0x29f/0x710 [ 1392.984735] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1392.989777] selinux_file_alloc_security+0xaf/0x190 [ 1392.994776] security_file_alloc+0x5c/0xa0 [ 1392.999002] __alloc_file+0xc9/0x330 [ 1393.002717] alloc_empty_file+0x6d/0x170 [ 1393.006768] path_openat+0xf2/0x4200 [ 1393.010477] ? __lock_acquire+0x6ee/0x49c0 [ 1393.014700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.020060] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1393.024716] ? __lock_is_held+0xad/0x140 [ 1393.028796] ? x86_decode_insn+0x1068/0x57a0 [ 1393.033188] do_filp_open+0x1a1/0x280 [ 1393.036971] ? may_open_dev+0xf0/0xf0 [ 1393.040752] ? find_held_lock+0x2d/0x110 [ 1393.044798] ? __alloc_fd+0x43c/0x550 [ 1393.048704] ? lock_downgrade+0x740/0x740 [ 1393.052836] ? __lock_is_held+0xad/0x140 [ 1393.056898] ? do_raw_spin_unlock+0x171/0x260 [ 1393.061390] ? _raw_spin_unlock+0x29/0x40 [ 1393.065520] ? __alloc_fd+0x43c/0x550 [ 1393.069350] do_sys_open+0x3c0/0x500 [ 1393.073053] ? filp_open+0x70/0x70 [ 1393.076590] ? __ia32_sys_clock_settime+0x260/0x260 [ 1393.081592] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1393.086331] ? trace_hardirqs_off_caller+0x55/0x210 [ 1393.091345] ? do_syscall_64+0x21/0x620 [ 1393.095317] do_syscall_64+0xf9/0x620 [ 1393.099115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.104300] RIP: 0033:0x4165e1 [ 1393.107475] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1393.126369] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1393.134069] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1393.141337] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1393.148724] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1393.156065] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1393.163353] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000002 14:16:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x1000000) 14:16:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) io_setup(0x8, &(0x7f0000000040)) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5413, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:45 executing program 3 (fault-call:0 fault-nth:3): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1393.579238] FAULT_INJECTION: forcing a failure. [ 1393.579238] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.608923] CPU: 0 PID: 30942 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1393.616846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.626206] Call Trace: 14:16:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1393.628806] dump_stack+0x188/0x20d [ 1393.632454] should_fail.cold+0xa/0x1b [ 1393.636363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1393.641480] ? __lock_is_held+0xad/0x140 [ 1393.645567] __should_failslab+0x115/0x180 [ 1393.649814] should_failslab+0x5/0xf [ 1393.653540] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1393.658223] ? lock_downgrade+0x740/0x740 [ 1393.662488] ? mon_bin_fetch+0x330/0x330 [ 1393.666560] mon_bin_open+0xe4/0x470 [ 1393.670288] ? mon_bin_fetch+0x330/0x330 [ 1393.674364] chrdev_open+0x219/0x5c0 14:16:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1393.678089] ? cdev_put.part.0+0x50/0x50 [ 1393.682166] ? security_file_open+0x162/0x1a0 [ 1393.686668] do_dentry_open+0x4a8/0x1160 [ 1393.690745] ? cdev_put.part.0+0x50/0x50 [ 1393.694809] ? security_inode_permission+0xc4/0xf0 [ 1393.699744] ? chown_common+0x550/0x550 [ 1393.703833] ? inode_permission+0xaf/0x550 [ 1393.708083] path_openat+0x1031/0x4200 [ 1393.712005] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1393.716696] do_filp_open+0x1a1/0x280 [ 1393.720505] ? may_open_dev+0xf0/0xf0 [ 1393.724311] ? find_held_lock+0x2d/0x110 14:16:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1393.728383] ? lock_downgrade+0x740/0x740 [ 1393.732539] ? __lock_is_held+0xad/0x140 [ 1393.736615] ? do_raw_spin_unlock+0x171/0x260 [ 1393.741119] ? _raw_spin_unlock+0x29/0x40 [ 1393.745276] ? __alloc_fd+0x43c/0x550 [ 1393.749099] do_sys_open+0x3c0/0x500 [ 1393.752830] ? filp_open+0x70/0x70 [ 1393.756386] ? __ia32_sys_clock_settime+0x260/0x260 [ 1393.761421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1393.766189] ? trace_hardirqs_off_caller+0x55/0x210 [ 1393.771219] ? do_syscall_64+0x21/0x620 [ 1393.775217] do_syscall_64+0xf9/0x620 [ 1393.779032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.784233] RIP: 0033:0x4165e1 [ 1393.787433] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1393.806342] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1393.814058] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1393.821337] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 14:16:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5414, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1393.828614] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1393.835890] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1393.843167] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000003 14:16:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x2000000) 14:16:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x9, &(0x7f0000000040)=[{0x3, 0x1}, {0x7, 0xdbc5}, {0x0, 0xa06a}, {0x824, 0x3}, {0x8, 0x8}, {0xffff, 0x1}, {0xff, 0x8000}, {0x3ff, 0x264}, {0x3ff, 0x8}]}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:16:46 executing program 3 (fault-call:0 fault-nth:4): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5415, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1394.492825] FAULT_INJECTION: forcing a failure. [ 1394.492825] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.513968] CPU: 1 PID: 30976 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1394.522385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.522395] Call Trace: [ 1394.522421] dump_stack+0x188/0x20d [ 1394.522444] should_fail.cold+0xa/0x1b [ 1394.522463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1394.522477] ? __lock_is_held+0xad/0x140 [ 1394.522502] __should_failslab+0x115/0x180 [ 1394.522517] should_failslab+0x5/0xf [ 1394.522529] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1394.522545] ? lock_downgrade+0x740/0x740 [ 1394.522567] ? mon_bin_fetch+0x330/0x330 [ 1394.522584] mon_bin_open+0xe4/0x470 [ 1394.575632] ? mon_bin_fetch+0x330/0x330 [ 1394.579707] chrdev_open+0x219/0x5c0 [ 1394.583451] ? cdev_put.part.0+0x50/0x50 [ 1394.587520] ? security_file_open+0x162/0x1a0 14:16:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1394.592026] do_dentry_open+0x4a8/0x1160 [ 1394.596097] ? cdev_put.part.0+0x50/0x50 [ 1394.600205] ? security_inode_permission+0xc4/0xf0 [ 1394.605243] ? chown_common+0x550/0x550 [ 1394.609226] ? inode_permission+0xaf/0x550 [ 1394.613479] path_openat+0x1031/0x4200 [ 1394.617378] ? mark_held_locks+0xf0/0xf0 [ 1394.621458] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1394.626159] do_filp_open+0x1a1/0x280 [ 1394.629968] ? may_open_dev+0xf0/0xf0 [ 1394.633772] ? find_held_lock+0x2d/0x110 [ 1394.637858] ? lock_downgrade+0x740/0x740 14:16:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1394.642013] ? __lock_is_held+0xad/0x140 [ 1394.646081] ? do_raw_spin_unlock+0x171/0x260 [ 1394.650596] ? _raw_spin_unlock+0x29/0x40 [ 1394.654763] ? __alloc_fd+0x43c/0x550 [ 1394.658592] do_sys_open+0x3c0/0x500 [ 1394.662312] ? filp_open+0x70/0x70 [ 1394.665863] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1394.670625] ? trace_hardirqs_off_caller+0x55/0x210 [ 1394.675648] ? do_syscall_64+0x21/0x620 [ 1394.679629] do_syscall_64+0xf9/0x620 [ 1394.683445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1394.688633] RIP: 0033:0x4165e1 [ 1394.691834] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1394.710785] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1394.718506] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1394.725797] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1394.733077] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:16:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5416, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1394.740352] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1394.747619] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000004 14:16:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x3000000) 14:16:47 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "2d568e1a8c97abb26a844a231cf35d44a567e263"}, 0x15, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0xe, 0xd5, 0x8, 0xc, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_spirange={0x2, 0x10, 0x4d6, 0x4d2}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e20}, @sadb_x_sa2={0x2, 0x13, 0x8, 0x0, 0x0, 0x70bd2c, 0x3502}, @sadb_address={0x5, 0x7, 0x33, 0x80, 0x0, @in6={0xa, 0x4e23, 0x80000001, @empty}}]}, 0x60}}, 0x24000081) 14:16:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5418, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:47 executing program 3 (fault-call:0 fault-nth:5): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1395.521166] FAULT_INJECTION: forcing a failure. [ 1395.521166] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.549265] CPU: 1 PID: 31006 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1395.557173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.566533] Call Trace: 14:16:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1395.569141] dump_stack+0x188/0x20d [ 1395.572789] should_fail.cold+0xa/0x1b [ 1395.576698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1395.581813] ? __lock_is_held+0xad/0x140 [ 1395.585889] __should_failslab+0x115/0x180 [ 1395.590245] should_failslab+0x5/0xf [ 1395.593972] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1395.598653] ? __lockdep_init_map+0x100/0x5a0 [ 1395.603162] ? __lockdep_init_map+0x100/0x5a0 [ 1395.607677] mon_bin_open+0x1a1/0x470 [ 1395.611493] ? mon_bin_fetch+0x330/0x330 [ 1395.615596] chrdev_open+0x219/0x5c0 14:16:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1395.619340] ? cdev_put.part.0+0x50/0x50 [ 1395.623419] ? security_file_open+0x162/0x1a0 [ 1395.627928] do_dentry_open+0x4a8/0x1160 [ 1395.632002] ? cdev_put.part.0+0x50/0x50 [ 1395.636088] ? security_inode_permission+0xc4/0xf0 [ 1395.641025] ? chown_common+0x550/0x550 [ 1395.645013] ? inode_permission+0xaf/0x550 [ 1395.649268] path_openat+0x1031/0x4200 [ 1395.653175] ? mark_held_locks+0xf0/0xf0 [ 1395.657251] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1395.662011] ? sctp_sendmsg_new_asoc+0x8/0xfd0 [ 1395.666630] do_filp_open+0x1a1/0x280 [ 1395.670449] ? may_open_dev+0xf0/0xf0 [ 1395.674380] ? find_held_lock+0x2d/0x110 [ 1395.678463] ? lock_downgrade+0x740/0x740 [ 1395.682634] ? __lock_is_held+0xad/0x140 [ 1395.686714] ? do_raw_spin_unlock+0x171/0x260 [ 1395.691225] ? _raw_spin_unlock+0x29/0x40 [ 1395.695429] ? __alloc_fd+0x43c/0x550 [ 1395.699253] do_sys_open+0x3c0/0x500 [ 1395.702978] ? filp_open+0x70/0x70 [ 1395.706530] ? __ia32_sys_clock_settime+0x260/0x260 [ 1395.711557] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1395.716331] ? trace_hardirqs_off_caller+0x55/0x210 14:16:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1395.721402] ? do_syscall_64+0x21/0x620 [ 1395.725424] do_syscall_64+0xf9/0x620 [ 1395.729240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1395.734431] RIP: 0033:0x4165e1 [ 1395.737659] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1395.756564] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1395.764274] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 14:16:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x541b, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1395.771542] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1395.778807] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1395.786078] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1395.793356] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000005 14:16:48 executing program 3 (fault-call:0 fault-nth:6): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:48 executing program 2: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x8) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf000000) 14:16:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x541c, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1396.550681] FAULT_INJECTION: forcing a failure. [ 1396.550681] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1396.600536] CPU: 1 PID: 31041 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1396.608464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.617822] Call Trace: [ 1396.620423] dump_stack+0x188/0x20d [ 1396.624069] should_fail.cold+0xa/0x1b [ 1396.627968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1396.633090] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1396.637771] ? find_held_lock+0x2d/0x110 [ 1396.641843] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1396.646877] ? __lock_is_held+0xad/0x140 14:16:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x541d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x345}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1396.650952] ? mon_bin_open+0x1a1/0x470 [ 1396.654953] alloc_pages_current+0xff/0x200 [ 1396.659283] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1396.664141] get_zeroed_page+0x10/0x40 [ 1396.668040] mon_alloc_buff+0xbc/0x190 [ 1396.671935] mon_bin_open+0x200/0x470 [ 1396.675747] ? mon_bin_fetch+0x330/0x330 [ 1396.679817] chrdev_open+0x219/0x5c0 [ 1396.683541] ? cdev_put.part.0+0x50/0x50 [ 1396.687619] ? security_file_open+0x162/0x1a0 [ 1396.692127] do_dentry_open+0x4a8/0x1160 [ 1396.696200] ? cdev_put.part.0+0x50/0x50 14:16:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1396.700272] ? security_inode_permission+0xc4/0xf0 [ 1396.705208] ? chown_common+0x550/0x550 [ 1396.709187] ? inode_permission+0xaf/0x550 [ 1396.713441] path_openat+0x1031/0x4200 [ 1396.717345] ? mark_held_locks+0xf0/0xf0 [ 1396.721422] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1396.726117] do_filp_open+0x1a1/0x280 [ 1396.729923] ? may_open_dev+0xf0/0xf0 [ 1396.733730] ? find_held_lock+0x2d/0x110 [ 1396.737809] ? lock_downgrade+0x740/0x740 [ 1396.741967] ? __lock_is_held+0xad/0x140 [ 1396.746044] ? do_raw_spin_unlock+0x171/0x260 14:16:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1396.750551] ? _raw_spin_unlock+0x29/0x40 [ 1396.754724] ? __alloc_fd+0x43c/0x550 [ 1396.758559] do_sys_open+0x3c0/0x500 [ 1396.762291] ? filp_open+0x70/0x70 [ 1396.765849] ? __ia32_sys_clock_settime+0x260/0x260 [ 1396.770873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1396.775663] ? trace_hardirqs_off_caller+0x55/0x210 [ 1396.780783] ? do_syscall_64+0x21/0x620 [ 1396.784800] do_syscall_64+0xf9/0x620 [ 1396.788614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.793829] RIP: 0033:0x4165e1 14:16:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1396.797119] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1396.816034] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1396.823754] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1396.831054] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1396.838330] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1396.845604] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1396.852884] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000006 14:16:48 executing program 3 (fault-call:0 fault-nth:7): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x3, 0x33) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendto$l2tp(r3, &(0x7f00000000c0)="01fae67a54d2dbe224764b3fa08a6ac08708190e2a1f923b799da21b284b92f1967a4b9d469034f4a19eedc61b254e6568e1f83ab82dbeaea4ac587b41b4c6c140e6ac74d380e5568795d409459cfcc3dfb5057ca62df5e2fd20cac8e21e990f35174886fc2bfb37cb3cc549cb96e30c03e4b57946d5e32e2ac7297a434562be8109d7bdc0fd906d0b4dbd79d4469ea010091699faaff2a3b8e191257e4b69ccfb869b9972d543850d57324b324246369ecc7919a7d4bd5995e34fe17ad9bdcb6504a47de49ec8b78f26de9cc900", 0xce, 0x5, &(0x7f0000000240)={0x2, 0x0, @remote, 0x1}, 0x10) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='uhd=', @ANYRESHEX=r2, @ANYBLOB="6e540e79e2871a55902bb2bb062c009aceef5e0cbb6d1c73b0cf0e526b62b5a768f0487ac46c25089a170968ee07da609f520000789404000000fdcf28"]) setuid(r2) 14:16:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x541e, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1397.010354] hfs: unable to parse mount options [ 1397.080953] FAULT_INJECTION: forcing a failure. [ 1397.080953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1397.095981] CPU: 0 PID: 31075 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1397.103883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.113246] Call Trace: [ 1397.115849] dump_stack+0x188/0x20d [ 1397.119494] should_fail.cold+0xa/0x1b [ 1397.123387] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.128519] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1397.133207] ? find_held_lock+0x2d/0x110 [ 1397.137300] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1397.142338] ? __lock_is_held+0xad/0x140 [ 1397.146413] ? mon_bin_open+0x1a1/0x470 [ 1397.150398] alloc_pages_current+0xff/0x200 [ 1397.154725] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1397.159579] get_zeroed_page+0x10/0x40 [ 1397.163487] mon_alloc_buff+0xbc/0x190 [ 1397.167388] mon_bin_open+0x200/0x470 [ 1397.171200] ? mon_bin_fetch+0x330/0x330 [ 1397.175273] chrdev_open+0x219/0x5c0 [ 1397.178997] ? cdev_put.part.0+0x50/0x50 [ 1397.183075] ? security_file_open+0x162/0x1a0 [ 1397.187581] do_dentry_open+0x4a8/0x1160 [ 1397.191650] ? cdev_put.part.0+0x50/0x50 [ 1397.195725] ? security_inode_permission+0xc4/0xf0 [ 1397.200671] ? chown_common+0x550/0x550 [ 1397.204658] ? inode_permission+0xaf/0x550 [ 1397.208903] path_openat+0x1031/0x4200 [ 1397.212805] ? mark_held_locks+0xf0/0xf0 [ 1397.216862] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1397.221522] do_filp_open+0x1a1/0x280 [ 1397.225319] ? may_open_dev+0xf0/0xf0 [ 1397.229111] ? find_held_lock+0x2d/0x110 [ 1397.233156] ? lock_downgrade+0x740/0x740 [ 1397.237292] ? __lock_is_held+0xad/0x140 [ 1397.241334] ? do_raw_spin_unlock+0x171/0x260 [ 1397.245823] ? _raw_spin_unlock+0x29/0x40 [ 1397.249965] ? __alloc_fd+0x43c/0x550 [ 1397.253892] do_sys_open+0x3c0/0x500 [ 1397.257617] ? filp_open+0x70/0x70 [ 1397.261146] ? __ia32_sys_clock_settime+0x260/0x260 [ 1397.266179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1397.270938] ? trace_hardirqs_off_caller+0x55/0x210 [ 1397.275945] ? do_syscall_64+0x21/0x620 [ 1397.279931] do_syscall_64+0xf9/0x620 [ 1397.283742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.288941] RIP: 0033:0x4165e1 [ 1397.292177] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1397.311181] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1397.318877] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1397.326148] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1397.333419] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1397.340723] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1397.347992] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000007 14:16:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x3f000000) 14:16:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5421, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x1d3, 0x207, 0x0}) 14:16:49 executing program 3 (fault-call:0 fault-nth:8): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1397.507424] FAULT_INJECTION: forcing a failure. [ 1397.507424] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:16:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1397.567356] CPU: 1 PID: 31090 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1397.575310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.584670] Call Trace: [ 1397.587275] dump_stack+0x188/0x20d [ 1397.590928] should_fail.cold+0xa/0x1b [ 1397.594840] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.599975] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1397.604658] ? find_held_lock+0x2d/0x110 [ 1397.608735] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1397.613771] ? __lock_is_held+0xad/0x140 14:16:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@null, @null, @netrom, @remote, @default, @netrom, @bcast, @null]}, &(0x7f00000000c0)=0x48, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) [ 1397.617846] ? mon_bin_open+0x1a1/0x470 [ 1397.621838] alloc_pages_current+0xff/0x200 [ 1397.626170] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1397.631042] get_zeroed_page+0x10/0x40 [ 1397.634944] mon_alloc_buff+0xbc/0x190 [ 1397.638856] mon_bin_open+0x200/0x470 [ 1397.642672] ? mon_bin_fetch+0x330/0x330 [ 1397.646741] chrdev_open+0x219/0x5c0 [ 1397.650469] ? cdev_put.part.0+0x50/0x50 [ 1397.654543] ? security_file_open+0x162/0x1a0 [ 1397.659051] do_dentry_open+0x4a8/0x1160 [ 1397.663125] ? cdev_put.part.0+0x50/0x50 [ 1397.667202] ? security_inode_permission+0xc4/0xf0 [ 1397.672147] ? chown_common+0x550/0x550 [ 1397.676138] ? inode_permission+0xaf/0x550 [ 1397.680401] path_openat+0x1031/0x4200 [ 1397.684309] ? mark_held_locks+0xf0/0xf0 [ 1397.688390] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1397.693090] do_filp_open+0x1a1/0x280 [ 1397.696904] ? may_open_dev+0xf0/0xf0 [ 1397.700710] ? find_held_lock+0x2d/0x110 [ 1397.704794] ? lock_downgrade+0x740/0x740 [ 1397.708973] ? __lock_is_held+0xad/0x140 [ 1397.713048] ? do_raw_spin_unlock+0x171/0x260 14:16:49 executing program 2: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x800) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r2, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1397.717559] ? _raw_spin_unlock+0x29/0x40 [ 1397.721719] ? __alloc_fd+0x43c/0x550 [ 1397.725540] do_sys_open+0x3c0/0x500 [ 1397.729266] ? filp_open+0x70/0x70 [ 1397.732817] ? __ia32_sys_clock_settime+0x260/0x260 [ 1397.737841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1397.742603] ? trace_hardirqs_off_caller+0x55/0x210 [ 1397.747652] ? do_syscall_64+0x21/0x620 [ 1397.751648] do_syscall_64+0xf9/0x620 [ 1397.755463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.760658] RIP: 0033:0x4165e1 14:16:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x800, 0x0}) [ 1397.763854] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1397.782756] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1397.790468] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1397.797759] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1397.805037] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1397.812366] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1397.819645] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000008 14:16:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x40000000) 14:16:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5422, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:50 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = socket(0x2, 0x803, 0xff) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x14, &(0x7f0000000000)={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000040)={r6, 0x3f, 0x3}, 0x8) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x18, 0x0}) 14:16:50 executing program 3 (fault-call:0 fault-nth:9): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1398.452878] FAULT_INJECTION: forcing a failure. [ 1398.452878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:16:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1398.498763] CPU: 1 PID: 31124 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1398.506692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.516055] Call Trace: [ 1398.518658] dump_stack+0x188/0x20d [ 1398.522306] should_fail.cold+0xa/0x1b [ 1398.526212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1398.531346] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1398.536026] ? find_held_lock+0x2d/0x110 [ 1398.540101] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1398.545165] ? __lock_is_held+0xad/0x140 [ 1398.549245] ? mon_bin_open+0x1a1/0x470 [ 1398.553247] alloc_pages_current+0xff/0x200 [ 1398.557585] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1398.562443] get_zeroed_page+0x10/0x40 [ 1398.566343] mon_alloc_buff+0xbc/0x190 [ 1398.570242] mon_bin_open+0x200/0x470 [ 1398.574053] ? mon_bin_fetch+0x330/0x330 [ 1398.578112] chrdev_open+0x219/0x5c0 [ 1398.581831] ? cdev_put.part.0+0x50/0x50 [ 1398.585909] ? security_file_open+0x162/0x1a0 [ 1398.590415] do_dentry_open+0x4a8/0x1160 [ 1398.594483] ? cdev_put.part.0+0x50/0x50 14:16:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1398.598620] ? security_inode_permission+0xc4/0xf0 [ 1398.603634] ? chown_common+0x550/0x550 [ 1398.607631] ? inode_permission+0xaf/0x550 [ 1398.611895] path_openat+0x1031/0x4200 [ 1398.615807] ? mark_held_locks+0xf0/0xf0 [ 1398.619892] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1398.624580] do_filp_open+0x1a1/0x280 [ 1398.628392] ? may_open_dev+0xf0/0xf0 [ 1398.632213] ? find_held_lock+0x2d/0x110 [ 1398.636306] ? lock_downgrade+0x740/0x740 [ 1398.640469] ? __lock_is_held+0xad/0x140 [ 1398.644543] ? do_raw_spin_unlock+0x171/0x260 14:16:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1398.649061] ? _raw_spin_unlock+0x29/0x40 [ 1398.653214] ? __alloc_fd+0x43c/0x550 [ 1398.657043] do_sys_open+0x3c0/0x500 [ 1398.660777] ? filp_open+0x70/0x70 [ 1398.664329] ? __ia32_sys_clock_settime+0x260/0x260 [ 1398.669353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1398.674109] ? trace_hardirqs_off_caller+0x55/0x210 [ 1398.679218] ? do_syscall_64+0x21/0x620 [ 1398.683203] do_syscall_64+0xf9/0x620 [ 1398.687018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.692220] RIP: 0033:0x4165e1 14:16:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1398.695422] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1398.714334] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1398.722057] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1398.729331] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1398.736606] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:16:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1398.743881] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1398.751151] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000009 14:16:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x51190000) 14:16:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:51 executing program 3 (fault-call:0 fault-nth:10): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1399.433242] FAULT_INJECTION: forcing a failure. [ 1399.433242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1399.489096] CPU: 1 PID: 31159 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1399.497016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.506378] Call Trace: [ 1399.508981] dump_stack+0x188/0x20d [ 1399.512627] should_fail.cold+0xa/0x1b [ 1399.516534] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:16:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1399.518658] audit: type=1400 audit(1584886611.450:151): avc: denied { create } for pid=31161 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 1399.521659] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1399.521677] ? find_held_lock+0x2d/0x110 [ 1399.521691] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1399.521709] ? __lock_is_held+0xad/0x140 [ 1399.563783] ? mon_bin_open+0x1a1/0x470 [ 1399.567787] alloc_pages_current+0xff/0x200 [ 1399.572116] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1399.577003] get_zeroed_page+0x10/0x40 [ 1399.580920] mon_alloc_buff+0xbc/0x190 [ 1399.584846] mon_bin_open+0x200/0x470 14:16:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1399.588765] ? mon_bin_fetch+0x330/0x330 [ 1399.592833] chrdev_open+0x219/0x5c0 [ 1399.596557] ? cdev_put.part.0+0x50/0x50 [ 1399.600638] ? security_file_open+0x162/0x1a0 [ 1399.605149] do_dentry_open+0x4a8/0x1160 [ 1399.609227] ? cdev_put.part.0+0x50/0x50 [ 1399.613302] ? security_inode_permission+0xc4/0xf0 [ 1399.618248] ? chown_common+0x550/0x550 [ 1399.622236] ? inode_permission+0xaf/0x550 [ 1399.626513] path_openat+0x1031/0x4200 [ 1399.630431] ? mark_held_locks+0xf0/0xf0 [ 1399.630458] ? path_lookupat.isra.0+0x8d0/0x8d0 14:16:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1399.630490] do_filp_open+0x1a1/0x280 [ 1399.630509] ? may_open_dev+0xf0/0xf0 [ 1399.630522] ? find_held_lock+0x2d/0x110 14:16:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5425, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1399.630545] ? lock_downgrade+0x740/0x740 [ 1399.630559] ? __lock_is_held+0xad/0x140 [ 1399.630576] ? do_raw_spin_unlock+0x171/0x260 [ 1399.630592] ? _raw_spin_unlock+0x29/0x40 [ 1399.630605] ? __alloc_fd+0x43c/0x550 [ 1399.630628] do_sys_open+0x3c0/0x500 [ 1399.630644] ? filp_open+0x70/0x70 [ 1399.630662] ? __ia32_sys_clock_settime+0x260/0x260 [ 1399.630678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1399.630692] ? trace_hardirqs_off_caller+0x55/0x210 [ 1399.630708] ? do_syscall_64+0x21/0x620 [ 1399.630727] do_syscall_64+0xf9/0x620 [ 1399.630745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.630756] RIP: 0033:0x4165e1 [ 1399.630770] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1399.630779] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1399.630793] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1399.630801] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1399.630810] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1399.630818] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1399.630826] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000000a 14:16:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x6b6b6b00) 14:16:52 executing program 3 (fault-call:0 fault-nth:11): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5427, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl(r2, 0x0, &(0x7f0000000080)="0a0493656d2b7ee26323507a1718") openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r1, 0xc02464bb, &(0x7f0000000040)={0x3, 0xffffff81, 0x80, 0xd5d7, 0x3, 0xffffff8d, 0x9, 0x7ff, 0x1}) 14:16:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1400.513231] FAULT_INJECTION: forcing a failure. [ 1400.513231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1400.565674] CPU: 1 PID: 31200 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1400.573608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.582971] Call Trace: [ 1400.585574] dump_stack+0x188/0x20d [ 1400.589230] should_fail.cold+0xa/0x1b [ 1400.593138] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1400.598261] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1400.602939] ? find_held_lock+0x2d/0x110 [ 1400.607015] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1400.612064] ? __lock_is_held+0xad/0x140 [ 1400.616138] ? mon_bin_open+0x1a1/0x470 [ 1400.620129] alloc_pages_current+0xff/0x200 [ 1400.624452] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1400.629305] get_zeroed_page+0x10/0x40 [ 1400.633201] mon_alloc_buff+0xbc/0x190 [ 1400.637097] mon_bin_open+0x200/0x470 [ 1400.640911] ? mon_bin_fetch+0x330/0x330 [ 1400.644979] chrdev_open+0x219/0x5c0 [ 1400.648695] ? cdev_put.part.0+0x50/0x50 [ 1400.652767] ? security_file_open+0x162/0x1a0 [ 1400.657271] do_dentry_open+0x4a8/0x1160 [ 1400.661357] ? cdev_put.part.0+0x50/0x50 14:16:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x800) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@loopback, @rand_addr="62fc4033f020497acb1d1271980621f8", @loopback, 0x800, 0x7, 0x0, 0x100, 0x78, 0x40000140, r2}) 14:16:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5428, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4503}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1400.665517] ? security_inode_permission+0xc4/0xf0 [ 1400.670461] ? chown_common+0x550/0x550 [ 1400.674447] ? inode_permission+0xaf/0x550 [ 1400.678703] path_openat+0x1031/0x4200 [ 1400.682623] ? mark_held_locks+0xf0/0xf0 [ 1400.686706] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1400.691401] do_filp_open+0x1a1/0x280 [ 1400.695221] ? may_open_dev+0xf0/0xf0 [ 1400.699033] ? find_held_lock+0x2d/0x110 [ 1400.703116] ? lock_downgrade+0x740/0x740 [ 1400.707271] ? __lock_is_held+0xad/0x140 [ 1400.711469] ? do_raw_spin_unlock+0x171/0x260 [ 1400.715983] ? _raw_spin_unlock+0x29/0x40 [ 1400.720141] ? __alloc_fd+0x43c/0x550 [ 1400.723968] do_sys_open+0x3c0/0x500 [ 1400.727698] ? filp_open+0x70/0x70 [ 1400.731253] ? __ia32_sys_clock_settime+0x260/0x260 [ 1400.736314] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1400.741079] ? trace_hardirqs_off_caller+0x55/0x210 [ 1400.746109] ? do_syscall_64+0x21/0x620 [ 1400.750113] do_syscall_64+0xf9/0x620 [ 1400.753928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1400.759123] RIP: 0033:0x4165e1 14:16:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1400.762321] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1400.781228] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1400.788941] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1400.796213] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1400.803488] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:16:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1400.810766] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1400.818043] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000000b 14:16:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x980f0000) 14:16:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5429, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000080)) r2 = open(0x0, 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x81) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000040)) 14:16:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:53 executing program 3 (fault-call:0 fault-nth:12): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5437, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1401.411770] FAULT_INJECTION: forcing a failure. [ 1401.411770] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:16:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1401.482843] CPU: 0 PID: 31239 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1401.490770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.500137] Call Trace: [ 1401.502751] dump_stack+0x188/0x20d [ 1401.506398] should_fail.cold+0xa/0x1b [ 1401.510324] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1401.515449] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1401.520125] ? find_held_lock+0x2d/0x110 [ 1401.524198] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1401.529247] ? __lock_is_held+0xad/0x140 14:16:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000440)={0x2, 0x1, 0x16, 0x20, 0x109, &(0x7f0000000040)="4f1eaee1b350c2b773ec73b6ba06463b979147ee626df74f19efab750376ede6f6bdbca9f88718df0c17b1a769b9f838cb6766bd8f0d2ca85f7131d436126fd6f291b8db13f9b305cf0553e3cbe9a48f3ec5c24b3af3825644207e9ab49ac48958c2f4aeb0188dc0a2cfcb1bebb4ed1b8e3341ecbe41e12637e18b09cedf885ed786cfcf528a3b76545ae48eb9909153c66af2748d1570db65a9467f636363c143ef6aa4517e8e71a4cdb8c7f9733e9024e4fb880d509f08e72a8609f3abda634885bbd66bc3c693b6dc41eef1cb6912fa1fe320599b4e7c57f90f08ba7802c6d5588f533c56296191f4ae7bc8ea24d31f88085c03b13e2303f9041234428010f5958db1fa21a19dd8587450e9e468c8f665841c7a624083b074fef5b18dfc2f0308854b543bb48a9fc31fee780c92ce89ac28e7854cdf984dd48572af4df1d89a66893f21a5570c53f7b822b4cfe84282c0a24c9c0b91ff300c5ba21fc20c277138552a4602da407b610a45327473f7c4dc2131ec893edc6d1397c87490177b27a434fed619f9e58ce282c89821eb2b8ce9eacb1ed154ae5e07741bb780c4cca02330d9701d25997dd01fbe52e71f44f0216e59d36f8a424a4454726ee56f745ae4e9858904971456283b0dd1cd0b270047a9539854139cdec5e7c60c7f0a769ed3dee79fe8cebeddeaed94b23aa92459619aef257f53b25292ac9b72abab3ce71daf1f2c60dc57aa967be463743d39236adb07ec5d55df9078a88279a6d45f1799b4a5bcddb6d7ff841086f4d7e3599fb2b07bd88369a089774e27dc98bbc58c6d00ef9a58a777980b25c8297e9bb8b40cb53bd00060742aede4fe314bc3376130a1559d5ec205eca3c216a866fda4b9b926b7973d51f33026d60ebb1f5b69b4818619b804694bf31ebb01816cc8e3e28e62c40c03c25956bdb6b9db07f7ddbc45c4fdc4d1d724b3b1ea3f055b100292626e6bccf2746ab9fb6ad45816707806e4cf1e7161302c1215603f275b01fda79cd0a7c66a2acff5e23209ed592be3aecf16fcded4ca68f6c254a0579dd3d1e091486bfd10c43368236951f815fced13c306ec6db4f1f7800b59a50eb13bcf20e3a5bc6fcb69c38130a06f903ed886bfde4047cbb3f10cbcd2669a4ee3b8ce7efab90d400a590ed10f8ccafff69db9b12f06ecd102e4fa9437f31711016bdb4d95ca03a1d87baa709c1e5a0baa8f904d42bdb05d729d39cc9f3ecee29914ba9de54d1cb8dee1727aea9973a4a49601ac3f047bf34cc8f1b74f144f1b4dede415dc680b66989db62079906a4f734563496ccd8469640f15500ee06b89c449799d5f91600856d107300f540a011183823ae88cb56da732efcbc4409c49cb0d35542716bca8b03d9d40a9ded4cf3ed729a2db9ba7c1c04fb6b178aaca2ad885b8cc989b35cd3283296f6ade0b211b6a73"}) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1401.533319] ? mon_bin_open+0x1a1/0x470 [ 1401.537327] alloc_pages_current+0xff/0x200 [ 1401.541654] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1401.546510] get_zeroed_page+0x10/0x40 [ 1401.550411] mon_alloc_buff+0xbc/0x190 [ 1401.554314] mon_bin_open+0x200/0x470 [ 1401.558127] ? mon_bin_fetch+0x330/0x330 [ 1401.562213] chrdev_open+0x219/0x5c0 [ 1401.562226] ? cdev_put.part.0+0x50/0x50 [ 1401.562243] ? security_file_open+0x162/0x1a0 [ 1401.562257] do_dentry_open+0x4a8/0x1160 [ 1401.562271] ? cdev_put.part.0+0x50/0x50 14:16:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1401.562285] ? security_inode_permission+0xc4/0xf0 [ 1401.562301] ? chown_common+0x550/0x550 [ 1401.562316] ? inode_permission+0xaf/0x550 [ 1401.562336] path_openat+0x1031/0x4200 [ 1401.562356] ? mark_held_locks+0xf0/0xf0 [ 1401.603735] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1401.603775] do_filp_open+0x1a1/0x280 [ 1401.603794] ? may_open_dev+0xf0/0xf0 [ 1401.603807] ? find_held_lock+0x2d/0x110 [ 1401.603832] ? lock_downgrade+0x740/0x740 [ 1401.603847] ? __lock_is_held+0xad/0x140 [ 1401.603866] ? do_raw_spin_unlock+0x171/0x260 [ 1401.603882] ? _raw_spin_unlock+0x29/0x40 [ 1401.603896] ? __alloc_fd+0x43c/0x550 [ 1401.603920] do_sys_open+0x3c0/0x500 [ 1401.603936] ? filp_open+0x70/0x70 [ 1401.603951] ? __ia32_sys_clock_settime+0x260/0x260 [ 1401.603969] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1401.657896] ? trace_hardirqs_off_caller+0x55/0x210 [ 1401.657914] ? do_syscall_64+0x21/0x620 [ 1401.667006] do_syscall_64+0xf9/0x620 [ 1401.670826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.676024] RIP: 0033:0x4165e1 [ 1401.679225] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1401.698129] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1401.705847] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1401.713126] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1401.720400] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1401.727677] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1401.734953] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000000c 14:16:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x9effffff) 14:16:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, 0x0) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0xfff, 0x4) 14:16:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5441, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:54 executing program 3 (fault-call:0 fault-nth:13): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5450, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1402.292258] FAULT_INJECTION: forcing a failure. [ 1402.292258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1402.322880] CPU: 0 PID: 31271 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1402.330809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:16:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1402.340173] Call Trace: [ 1402.342790] dump_stack+0x188/0x20d [ 1402.346439] should_fail.cold+0xa/0x1b [ 1402.350346] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1402.355476] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1402.360246] ? find_held_lock+0x2d/0x110 [ 1402.364329] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1402.369471] ? __lock_is_held+0xad/0x140 [ 1402.373549] ? mon_bin_open+0x1a1/0x470 [ 1402.377639] alloc_pages_current+0xff/0x200 [ 1402.381977] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1402.386837] get_zeroed_page+0x10/0x40 14:16:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5451, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1402.390738] mon_alloc_buff+0xbc/0x190 [ 1402.394646] mon_bin_open+0x200/0x470 [ 1402.398472] ? mon_bin_fetch+0x330/0x330 [ 1402.402545] chrdev_open+0x219/0x5c0 [ 1402.406273] ? cdev_put.part.0+0x50/0x50 [ 1402.410356] ? security_file_open+0x162/0x1a0 [ 1402.414869] do_dentry_open+0x4a8/0x1160 [ 1402.418945] ? cdev_put.part.0+0x50/0x50 [ 1402.423017] ? security_inode_permission+0xc4/0xf0 [ 1402.427957] ? chown_common+0x550/0x550 [ 1402.431957] ? inode_permission+0xaf/0x550 [ 1402.436209] path_openat+0x1031/0x4200 14:16:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1402.440121] ? mark_held_locks+0xf0/0xf0 [ 1402.444195] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1402.448888] do_filp_open+0x1a1/0x280 [ 1402.452702] ? may_open_dev+0xf0/0xf0 [ 1402.456513] ? find_held_lock+0x2d/0x110 [ 1402.460595] ? lock_downgrade+0x740/0x740 [ 1402.464753] ? __lock_is_held+0xad/0x140 [ 1402.468827] ? do_raw_spin_unlock+0x171/0x260 [ 1402.473330] ? _raw_spin_unlock+0x29/0x40 [ 1402.477487] ? __alloc_fd+0x43c/0x550 [ 1402.481304] do_sys_open+0x3c0/0x500 [ 1402.485030] ? filp_open+0x70/0x70 14:16:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1402.488582] ? __ia32_sys_clock_settime+0x260/0x260 [ 1402.493610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1402.498372] ? trace_hardirqs_off_caller+0x55/0x210 [ 1402.503405] ? do_syscall_64+0x21/0x620 [ 1402.507403] do_syscall_64+0xf9/0x620 [ 1402.511217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1402.516416] RIP: 0033:0x4165e1 [ 1402.519614] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1402.538521] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1402.546239] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1402.553514] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1402.560786] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1402.568063] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1402.575336] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000000d 14:16:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xe0000000) 14:16:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x545d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:55 executing program 2: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket$kcm(0x29, 0x2, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f0000000040)=0x1) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:55 executing program 3 (fault-call:0 fault-nth:14): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1403.179966] FAULT_INJECTION: forcing a failure. [ 1403.179966] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1403.248213] CPU: 1 PID: 31307 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1403.256143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.265516] Call Trace: [ 1403.268127] dump_stack+0x188/0x20d [ 1403.271777] should_fail.cold+0xa/0x1b [ 1403.275680] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1403.280815] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1403.285499] ? find_held_lock+0x2d/0x110 [ 1403.289587] ? __alloc_pages_slowpath+0x26a0/0x26a0 14:16:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:55 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0x3, 0x20, 0x0}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0xc0a02, 0x0) [ 1403.294615] ? __lock_is_held+0xad/0x140 [ 1403.298710] ? mon_bin_open+0x1a1/0x470 [ 1403.302708] alloc_pages_current+0xff/0x200 [ 1403.307036] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1403.311899] get_zeroed_page+0x10/0x40 [ 1403.315797] mon_alloc_buff+0xbc/0x190 [ 1403.319703] mon_bin_open+0x200/0x470 [ 1403.323537] ? mon_bin_fetch+0x330/0x330 [ 1403.327737] chrdev_open+0x219/0x5c0 [ 1403.331469] ? cdev_put.part.0+0x50/0x50 [ 1403.335551] ? security_file_open+0x162/0x1a0 [ 1403.340064] do_dentry_open+0x4a8/0x1160 [ 1403.344141] ? cdev_put.part.0+0x50/0x50 14:16:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1403.348214] ? security_inode_permission+0xc4/0xf0 [ 1403.353155] ? chown_common+0x550/0x550 [ 1403.357140] ? inode_permission+0xaf/0x550 [ 1403.361398] path_openat+0x1031/0x4200 [ 1403.365306] ? mark_held_locks+0xf0/0xf0 [ 1403.369382] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1403.374080] do_filp_open+0x1a1/0x280 [ 1403.377894] ? may_open_dev+0xf0/0xf0 [ 1403.381709] ? find_held_lock+0x2d/0x110 [ 1403.385790] ? lock_downgrade+0x740/0x740 [ 1403.389948] ? __lock_is_held+0xad/0x140 [ 1403.394024] ? do_raw_spin_unlock+0x171/0x260 14:16:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1403.398534] ? _raw_spin_unlock+0x29/0x40 [ 1403.402690] ? __alloc_fd+0x43c/0x550 [ 1403.406513] do_sys_open+0x3c0/0x500 [ 1403.410241] ? filp_open+0x70/0x70 [ 1403.413788] ? __ia32_sys_clock_settime+0x260/0x260 [ 1403.418816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1403.423580] ? trace_hardirqs_off_caller+0x55/0x210 [ 1403.428618] ? do_syscall_64+0x21/0x620 [ 1403.432616] do_syscall_64+0xf9/0x620 [ 1403.436440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1403.441644] RIP: 0033:0x4165e1 14:16:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1403.444850] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1403.463760] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1403.471482] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1403.478763] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1403.486037] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1403.493309] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1403.500585] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000000e 14:16:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf0ffffff) 14:16:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5460, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40800) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x30280, 0xa1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r1}) connect$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x1000, @fixed={[], 0x12}, 0x20, 0x1}, 0xe) 14:16:56 executing program 3 (fault-call:0 fault-nth:15): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1404.089057] FAULT_INJECTION: forcing a failure. [ 1404.089057] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1404.109759] CPU: 0 PID: 31339 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1404.117794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.127152] Call Trace: [ 1404.129754] dump_stack+0x188/0x20d [ 1404.133399] should_fail.cold+0xa/0x1b [ 1404.137309] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1404.142436] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1404.147128] ? find_held_lock+0x2d/0x110 [ 1404.151207] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1404.156245] ? __lock_is_held+0xad/0x140 [ 1404.160420] ? mon_bin_open+0x1a1/0x470 [ 1404.164416] alloc_pages_current+0xff/0x200 [ 1404.168748] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1404.173731] get_zeroed_page+0x10/0x40 [ 1404.177638] mon_alloc_buff+0xbc/0x190 [ 1404.181552] mon_bin_open+0x200/0x470 [ 1404.185369] ? mon_bin_fetch+0x330/0x330 14:16:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5600, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5601, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1404.189440] chrdev_open+0x219/0x5c0 [ 1404.193165] ? cdev_put.part.0+0x50/0x50 [ 1404.197242] ? security_file_open+0x162/0x1a0 [ 1404.201748] do_dentry_open+0x4a8/0x1160 [ 1404.205818] ? cdev_put.part.0+0x50/0x50 [ 1404.209890] ? security_inode_permission+0xc4/0xf0 [ 1404.214834] ? chown_common+0x550/0x550 [ 1404.218830] ? inode_permission+0xaf/0x550 [ 1404.223085] path_openat+0x1031/0x4200 [ 1404.227015] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1404.231709] do_filp_open+0x1a1/0x280 [ 1404.235518] ? may_open_dev+0xf0/0xf0 14:16:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5602, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1404.239439] ? find_held_lock+0x2d/0x110 [ 1404.243520] ? lock_downgrade+0x740/0x740 [ 1404.247687] ? __lock_is_held+0xad/0x140 [ 1404.251777] ? do_raw_spin_unlock+0x171/0x260 [ 1404.251793] ? _raw_spin_unlock+0x29/0x40 [ 1404.251807] ? __alloc_fd+0x43c/0x550 [ 1404.251831] do_sys_open+0x3c0/0x500 [ 1404.251847] ? filp_open+0x70/0x70 [ 1404.251864] ? __ia32_sys_clock_settime+0x260/0x260 [ 1404.251880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1404.251895] ? trace_hardirqs_off_caller+0x55/0x210 14:16:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1404.251911] ? do_syscall_64+0x21/0x620 [ 1404.251930] do_syscall_64+0xf9/0x620 [ 1404.251948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.251958] RIP: 0033:0x4165e1 [ 1404.251974] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1404.321397] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:16:56 executing program 3 (fault-call:0 fault-nth:16): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1404.329132] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1404.329143] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1404.329151] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1404.329159] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1404.329167] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000000f [ 1404.504996] FAULT_INJECTION: forcing a failure. [ 1404.504996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1404.539555] CPU: 0 PID: 31366 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1404.547462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.556821] Call Trace: [ 1404.559427] dump_stack+0x188/0x20d [ 1404.563081] should_fail.cold+0xa/0x1b [ 1404.566988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1404.572102] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1404.576758] ? find_held_lock+0x2d/0x110 [ 1404.580805] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1404.585809] ? __lock_is_held+0xad/0x140 [ 1404.589855] ? mon_bin_open+0x1a1/0x470 [ 1404.593818] alloc_pages_current+0xff/0x200 [ 1404.598139] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1404.602975] get_zeroed_page+0x10/0x40 [ 1404.606849] mon_alloc_buff+0xbc/0x190 [ 1404.610724] mon_bin_open+0x200/0x470 [ 1404.614513] ? mon_bin_fetch+0x330/0x330 [ 1404.618573] chrdev_open+0x219/0x5c0 [ 1404.622271] ? cdev_put.part.0+0x50/0x50 [ 1404.626319] ? security_file_open+0x162/0x1a0 [ 1404.630801] do_dentry_open+0x4a8/0x1160 [ 1404.634849] ? cdev_put.part.0+0x50/0x50 [ 1404.638895] ? security_inode_permission+0xc4/0xf0 [ 1404.643845] ? chown_common+0x550/0x550 [ 1404.647804] ? inode_permission+0xaf/0x550 [ 1404.652028] path_openat+0x1031/0x4200 [ 1404.655919] ? mark_held_locks+0xf0/0xf0 [ 1404.659989] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1404.664661] do_filp_open+0x1a1/0x280 [ 1404.668452] ? may_open_dev+0xf0/0xf0 [ 1404.672239] ? find_held_lock+0x2d/0x110 [ 1404.676294] ? lock_downgrade+0x740/0x740 [ 1404.680427] ? __lock_is_held+0xad/0x140 [ 1404.684488] ? do_raw_spin_unlock+0x171/0x260 [ 1404.688991] ? _raw_spin_unlock+0x29/0x40 [ 1404.693122] ? __alloc_fd+0x43c/0x550 [ 1404.696913] do_sys_open+0x3c0/0x500 [ 1404.700613] ? filp_open+0x70/0x70 [ 1404.704147] ? __ia32_sys_clock_settime+0x260/0x260 [ 1404.709148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1404.713888] ? trace_hardirqs_off_caller+0x55/0x210 [ 1404.718901] ? do_syscall_64+0x21/0x620 [ 1404.722864] do_syscall_64+0xf9/0x620 [ 1404.726665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.731998] RIP: 0033:0x4165e1 [ 1404.735176] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1404.754063] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1404.761774] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1404.769027] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1404.776282] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1404.783533] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1404.790781] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000010 14:16:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xfffff000) 14:16:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040)="f80433a3a81c22d61740be907e2ddaf8245df64f8f6ad99b6de527272a9fb32e084a5f00c261d1b72ff655098dc17ab49974825af02f8df234a80f4d13745fc12a82eff3bf7896377258d0", 0x4b) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:56 executing program 3 (fault-call:0 fault-nth:17): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1405.007027] ipt_CLUSTERIP: Please specify destination IP [ 1405.025853] FAULT_INJECTION: forcing a failure. [ 1405.025853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1405.049590] ipt_CLUSTERIP: Please specify destination IP [ 1405.060006] CPU: 1 PID: 31381 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1405.067912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.077289] Call Trace: [ 1405.079889] dump_stack+0x188/0x20d [ 1405.083533] should_fail.cold+0xa/0x1b [ 1405.087434] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1405.092560] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1405.097248] ? find_held_lock+0x2d/0x110 [ 1405.101320] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1405.106352] ? __lock_is_held+0xad/0x140 [ 1405.110424] ? mon_bin_open+0x1a1/0x470 [ 1405.114418] alloc_pages_current+0xff/0x200 [ 1405.118744] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1405.123616] get_zeroed_page+0x10/0x40 [ 1405.127590] mon_alloc_buff+0xbc/0x190 [ 1405.131486] mon_bin_open+0x200/0x470 [ 1405.135302] ? mon_bin_fetch+0x330/0x330 [ 1405.139377] chrdev_open+0x219/0x5c0 [ 1405.143102] ? cdev_put.part.0+0x50/0x50 [ 1405.147181] ? security_file_open+0x162/0x1a0 [ 1405.151689] do_dentry_open+0x4a8/0x1160 [ 1405.155763] ? cdev_put.part.0+0x50/0x50 14:16:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1405.159833] ? security_inode_permission+0xc4/0xf0 [ 1405.164776] ? chown_common+0x550/0x550 [ 1405.168753] ? inode_permission+0xaf/0x550 [ 1405.173008] path_openat+0x1031/0x4200 [ 1405.176911] ? mark_held_locks+0xf0/0xf0 [ 1405.180994] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1405.185691] do_filp_open+0x1a1/0x280 [ 1405.189502] ? may_open_dev+0xf0/0xf0 [ 1405.193304] ? find_held_lock+0x2d/0x110 [ 1405.197386] ? lock_downgrade+0x740/0x740 [ 1405.201569] ? __lock_is_held+0xad/0x140 [ 1405.205649] ? do_raw_spin_unlock+0x171/0x260 [ 1405.210155] ? _raw_spin_unlock+0x29/0x40 [ 1405.214321] ? __alloc_fd+0x43c/0x550 [ 1405.218148] do_sys_open+0x3c0/0x500 [ 1405.221876] ? filp_open+0x70/0x70 [ 1405.225433] ? __ia32_sys_clock_settime+0x260/0x260 [ 1405.230462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1405.235246] ? trace_hardirqs_off_caller+0x55/0x210 [ 1405.240288] ? do_syscall_64+0x21/0x620 [ 1405.244279] do_syscall_64+0xf9/0x620 [ 1405.248102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1405.253413] RIP: 0033:0x4165e1 14:16:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1405.256619] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1405.275632] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1405.283351] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1405.290629] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1405.297909] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:16:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5605, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1405.305178] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1405.312454] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000011 14:16:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xffffff9e) 14:16:57 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x5, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="580e000030003dfa000000000000000000000000440e0100400e01000a00010070656469740000002c0e02800800058004000680200e040000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000adaa4ec500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0xe58}}, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c6530207065646974002070656469740020207d2b3a20407070703019706f7f69785f61636c5f6163636573732c6d696d655f74797065776c616e31656d30747275737465646367726f7570296d643573756d0a1ee5a65518b2fc6c867a935752d2439e83cf63d5bd11b75e0d9bd16c5736f03b7214e81563b1006b61e2b9e5a9d4e65626f35a02e8491509b91538d213fb906e6c603578a0621ae6a075230ddb5a27e5"], 0xab) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCSETX(r4, 0x5433, &(0x7f0000000080)={0x1ff, 0x8001, [0x4fa, 0x7, 0x0, 0xff7f]}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x224000, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r5, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x20, 0x1404, 0x1, 0x70bd27, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x40800}, 0x40000) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x8) 14:16:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x2}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5606, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:57 executing program 3 (fault-call:0 fault-nth:18): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1405.920509] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=31411 comm=syz-executor.2 [ 1405.933790] FAULT_INJECTION: forcing a failure. [ 1405.933790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1405.973632] CPU: 0 PID: 31414 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1405.981552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.990908] Call Trace: [ 1405.993516] dump_stack+0x188/0x20d [ 1405.997165] should_fail.cold+0xa/0x1b [ 1406.001075] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.006210] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1406.010896] ? find_held_lock+0x2d/0x110 [ 1406.014978] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1406.020014] ? __lock_is_held+0xad/0x140 [ 1406.024092] ? mon_bin_open+0x1a1/0x470 [ 1406.028088] alloc_pages_current+0xff/0x200 [ 1406.032423] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1406.037281] get_zeroed_page+0x10/0x40 [ 1406.037418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=31411 comm=syz-executor.2 [ 1406.041171] mon_alloc_buff+0xbc/0x190 [ 1406.041192] mon_bin_open+0x200/0x470 [ 1406.041211] ? mon_bin_fetch+0x330/0x330 [ 1406.065434] chrdev_open+0x219/0x5c0 [ 1406.069165] ? cdev_put.part.0+0x50/0x50 [ 1406.073246] ? security_file_open+0x162/0x1a0 [ 1406.077755] do_dentry_open+0x4a8/0x1160 [ 1406.081828] ? cdev_put.part.0+0x50/0x50 [ 1406.085899] ? security_inode_permission+0xc4/0xf0 [ 1406.090837] ? chown_common+0x550/0x550 [ 1406.094823] ? inode_permission+0xaf/0x550 [ 1406.099103] path_openat+0x1031/0x4200 [ 1406.103020] ? mark_held_locks+0xf0/0xf0 [ 1406.107093] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1406.111809] do_filp_open+0x1a1/0x280 [ 1406.115637] ? may_open_dev+0xf0/0xf0 [ 1406.119450] ? find_held_lock+0x2d/0x110 14:16:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5607, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5608, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x3}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1406.123534] ? lock_downgrade+0x740/0x740 [ 1406.127707] ? __lock_is_held+0xad/0x140 [ 1406.131776] ? do_raw_spin_unlock+0x171/0x260 [ 1406.136277] ? _raw_spin_unlock+0x29/0x40 [ 1406.140433] ? __alloc_fd+0x43c/0x550 [ 1406.144252] do_sys_open+0x3c0/0x500 [ 1406.147976] ? filp_open+0x70/0x70 [ 1406.151542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1406.151556] ? trace_hardirqs_off_caller+0x55/0x210 14:16:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1406.151572] ? do_syscall_64+0x21/0x620 [ 1406.151590] do_syscall_64+0xf9/0x620 [ 1406.151608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.151630] RIP: 0033:0x4165e1 [ 1406.151644] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1406.151651] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1406.151664] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1406.151671] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1406.151679] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1406.151686] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1406.151693] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000012 14:16:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xfffffff0) 14:16:58 executing program 2: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000040)=""/170) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000100)=""/156) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x5}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:58 executing program 3 (fault-call:0 fault-nth:19): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1406.846513] FAULT_INJECTION: forcing a failure. [ 1406.846513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1406.867603] CPU: 1 PID: 31451 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1406.875523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.884883] Call Trace: [ 1406.887488] dump_stack+0x188/0x20d [ 1406.891134] should_fail.cold+0xa/0x1b 14:16:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560b, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1406.895151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.900280] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1406.904963] ? find_held_lock+0x2d/0x110 [ 1406.909040] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1406.914075] ? __lock_is_held+0xad/0x140 [ 1406.918150] ? mon_bin_open+0x1a1/0x470 [ 1406.922142] alloc_pages_current+0xff/0x200 [ 1406.926471] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1406.931326] get_zeroed_page+0x10/0x40 [ 1406.935221] mon_alloc_buff+0xbc/0x190 [ 1406.939125] mon_bin_open+0x200/0x470 [ 1406.942933] ? mon_bin_fetch+0x330/0x330 [ 1406.947001] chrdev_open+0x219/0x5c0 [ 1406.950728] ? cdev_put.part.0+0x50/0x50 [ 1406.954805] ? security_file_open+0x162/0x1a0 [ 1406.959314] do_dentry_open+0x4a8/0x1160 [ 1406.963404] ? cdev_put.part.0+0x50/0x50 [ 1406.967487] ? security_inode_permission+0xc4/0xf0 [ 1406.972487] ? chown_common+0x550/0x550 [ 1406.976469] ? inode_permission+0xaf/0x550 [ 1406.980733] path_openat+0x1031/0x4200 [ 1406.984662] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1406.989363] do_filp_open+0x1a1/0x280 [ 1406.993180] ? may_open_dev+0xf0/0xf0 14:16:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560c, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1406.996988] ? find_held_lock+0x2d/0x110 [ 1407.001073] ? lock_downgrade+0x740/0x740 [ 1407.005235] ? __lock_is_held+0xad/0x140 [ 1407.009310] ? do_raw_spin_unlock+0x171/0x260 [ 1407.013822] ? _raw_spin_unlock+0x29/0x40 [ 1407.017984] ? __alloc_fd+0x43c/0x550 [ 1407.021811] do_sys_open+0x3c0/0x500 [ 1407.025538] ? filp_open+0x70/0x70 [ 1407.029094] ? __ia32_sys_clock_settime+0x260/0x260 [ 1407.034122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1407.038887] ? trace_hardirqs_off_caller+0x55/0x210 14:16:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1407.043916] ? do_syscall_64+0x21/0x620 [ 1407.047907] do_syscall_64+0xf9/0x620 [ 1407.051727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.056925] RIP: 0033:0x4165e1 [ 1407.060128] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1407.079049] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1407.086768] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 14:16:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x18b102, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) dup2(r0, r2) [ 1407.094114] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1407.101389] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1407.108664] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1407.115940] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000013 14:16:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x40030000000000) 14:16:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560d, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x2c0280, 0x101) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7) ioctl$FBIOBLANK(r1, 0x4611, 0x2) 14:16:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x8}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:59 executing program 3 (fault-call:0 fault-nth:20): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:16:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1407.699462] FAULT_INJECTION: forcing a failure. [ 1407.699462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1407.742568] CPU: 0 PID: 31484 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1407.750498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.759859] Call Trace: [ 1407.762461] dump_stack+0x188/0x20d [ 1407.766108] should_fail.cold+0xa/0x1b [ 1407.770017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1407.775148] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1407.779830] ? find_held_lock+0x2d/0x110 [ 1407.783903] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1407.788938] ? __lock_is_held+0xad/0x140 [ 1407.793018] ? mon_bin_open+0x1a1/0x470 [ 1407.797012] alloc_pages_current+0xff/0x200 [ 1407.801347] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1407.806211] get_zeroed_page+0x10/0x40 [ 1407.810109] mon_alloc_buff+0xbc/0x190 [ 1407.814015] mon_bin_open+0x200/0x470 [ 1407.817842] ? mon_bin_fetch+0x330/0x330 [ 1407.821936] chrdev_open+0x219/0x5c0 [ 1407.825666] ? cdev_put.part.0+0x50/0x50 [ 1407.829751] ? security_file_open+0x162/0x1a0 [ 1407.834258] do_dentry_open+0x4a8/0x1160 [ 1407.838351] ? cdev_put.part.0+0x50/0x50 [ 1407.842424] ? security_inode_permission+0xc4/0xf0 [ 1407.847364] ? chown_common+0x550/0x550 [ 1407.851358] ? inode_permission+0xaf/0x550 [ 1407.855614] path_openat+0x1031/0x4200 [ 1407.859525] ? mark_held_locks+0xf0/0xf0 [ 1407.863608] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1407.868306] do_filp_open+0x1a1/0x280 [ 1407.872116] ? may_open_dev+0xf0/0xf0 [ 1407.875924] ? find_held_lock+0x2d/0x110 [ 1407.880012] ? lock_downgrade+0x740/0x740 [ 1407.884171] ? __lock_is_held+0xad/0x140 [ 1407.888240] ? do_raw_spin_unlock+0x171/0x260 [ 1407.892747] ? _raw_spin_unlock+0x29/0x40 [ 1407.896908] ? __alloc_fd+0x43c/0x550 [ 1407.900729] do_sys_open+0x3c0/0x500 [ 1407.904454] ? filp_open+0x70/0x70 [ 1407.908012] ? __ia32_sys_clock_settime+0x260/0x260 [ 1407.913040] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1407.917804] ? trace_hardirqs_off_caller+0x55/0x210 [ 1407.922836] ? do_syscall_64+0x21/0x620 [ 1407.926918] do_syscall_64+0xf9/0x620 [ 1407.930745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.935944] RIP: 0033:0x4165e1 [ 1407.939154] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1407.958058] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1407.965884] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1407.973161] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1407.980440] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:16:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x9}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:59 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:16:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xa}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:16:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:16:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560e, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1407.987714] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1407.994989] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000014 14:17:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x6b6b6b00000000) 14:17:00 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000009140)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000009080)={0x14, r3, 0x390c179b360adb45}, 0x14}}, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x100}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x4000004) 14:17:00 executing program 3 (fault-call:0 fault-nth:21): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xb}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1408.642552] FAULT_INJECTION: forcing a failure. [ 1408.642552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1408.674827] CPU: 1 PID: 31517 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1408.682757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.692115] Call Trace: [ 1408.694725] dump_stack+0x188/0x20d [ 1408.698375] should_fail.cold+0xa/0x1b [ 1408.702281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1408.707415] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1408.712095] ? find_held_lock+0x2d/0x110 [ 1408.716173] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1408.721208] ? __lock_is_held+0xad/0x140 [ 1408.725500] ? mon_bin_open+0x1a1/0x470 [ 1408.729492] alloc_pages_current+0xff/0x200 [ 1408.733827] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1408.738685] get_zeroed_page+0x10/0x40 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xc}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xe}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1408.742585] mon_alloc_buff+0xbc/0x190 [ 1408.746490] mon_bin_open+0x200/0x470 [ 1408.750305] ? mon_bin_fetch+0x330/0x330 [ 1408.754381] chrdev_open+0x219/0x5c0 [ 1408.758110] ? cdev_put.part.0+0x50/0x50 [ 1408.762197] ? security_file_open+0x162/0x1a0 [ 1408.766709] do_dentry_open+0x4a8/0x1160 [ 1408.770787] ? cdev_put.part.0+0x50/0x50 [ 1408.774863] ? security_inode_permission+0xc4/0xf0 [ 1408.779910] ? chown_common+0x550/0x550 [ 1408.783897] ? inode_permission+0xaf/0x550 [ 1408.788164] path_openat+0x1031/0x4200 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x10}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1408.792079] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1408.796777] do_filp_open+0x1a1/0x280 [ 1408.800594] ? may_open_dev+0xf0/0xf0 [ 1408.804405] ? find_held_lock+0x2d/0x110 [ 1408.808493] ? lock_downgrade+0x740/0x740 [ 1408.812651] ? __lock_is_held+0xad/0x140 [ 1408.816734] ? do_raw_spin_unlock+0x171/0x260 [ 1408.821251] ? _raw_spin_unlock+0x29/0x40 [ 1408.825412] ? __alloc_fd+0x43c/0x550 [ 1408.829238] do_sys_open+0x3c0/0x500 [ 1408.832963] ? filp_open+0x70/0x70 [ 1408.836513] ? __ia32_sys_clock_settime+0x260/0x260 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x60}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1408.841542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1408.846308] ? trace_hardirqs_off_caller+0x55/0x210 [ 1408.851339] ? do_syscall_64+0x21/0x620 [ 1408.855328] do_syscall_64+0xf9/0x620 [ 1408.859146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.864349] RIP: 0033:0x4165e1 [ 1408.867555] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:17:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xb6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1408.886461] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1408.894176] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1408.901450] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1408.908728] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1408.916003] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1408.923280] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000015 14:17:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560f, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf0ffffffffffff) 14:17:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:01 executing program 2: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f00000000c0)={0x20, 0x0, 0x4, 0x4, 0x4919}) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:01 executing program 3 (fault-call:0 fault-nth:22): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1409.533031] FAULT_INJECTION: forcing a failure. [ 1409.533031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1409.573228] CPU: 0 PID: 31554 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1409.581139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.590497] Call Trace: [ 1409.593098] dump_stack+0x188/0x20d [ 1409.596751] should_fail.cold+0xa/0x1b [ 1409.600657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1409.605878] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1409.610559] ? find_held_lock+0x2d/0x110 [ 1409.614628] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1409.619762] ? __lock_is_held+0xad/0x140 [ 1409.623841] ? mon_bin_open+0x1a1/0x470 [ 1409.627841] alloc_pages_current+0xff/0x200 [ 1409.632172] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1409.637114] get_zeroed_page+0x10/0x40 [ 1409.641012] mon_alloc_buff+0xbc/0x190 [ 1409.644913] mon_bin_open+0x200/0x470 [ 1409.648726] ? mon_bin_fetch+0x330/0x330 [ 1409.652793] chrdev_open+0x219/0x5c0 [ 1409.656522] ? cdev_put.part.0+0x50/0x50 [ 1409.660604] ? security_file_open+0x162/0x1a0 [ 1409.665124] do_dentry_open+0x4a8/0x1160 [ 1409.669210] ? cdev_put.part.0+0x50/0x50 14:17:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x40087602, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x500}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1409.673286] ? security_inode_permission+0xc4/0xf0 [ 1409.678230] ? chown_common+0x550/0x550 [ 1409.682218] ? inode_permission+0xaf/0x550 [ 1409.686473] path_openat+0x1031/0x4200 [ 1409.690384] ? mark_held_locks+0xf0/0xf0 [ 1409.694458] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1409.699174] do_filp_open+0x1a1/0x280 [ 1409.702982] ? may_open_dev+0xf0/0xf0 [ 1409.706787] ? find_held_lock+0x2d/0x110 [ 1409.710870] ? lock_downgrade+0x740/0x740 [ 1409.715028] ? __lock_is_held+0xad/0x140 [ 1409.719113] ? do_raw_spin_unlock+0x171/0x260 14:17:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80045432, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1409.723622] ? _raw_spin_unlock+0x29/0x40 [ 1409.727780] ? __alloc_fd+0x43c/0x550 [ 1409.731597] do_sys_open+0x3c0/0x500 [ 1409.735326] ? filp_open+0x70/0x70 [ 1409.738895] ? __ia32_sys_clock_settime+0x260/0x260 [ 1409.743926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1409.748689] ? trace_hardirqs_off_caller+0x55/0x210 [ 1409.753712] ? do_syscall_64+0x21/0x620 [ 1409.757695] do_syscall_64+0xf9/0x620 [ 1409.761506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.766707] RIP: 0033:0x4165e1 [ 1409.769905] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1409.788921] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1409.796639] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1409.803911] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1409.811186] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1409.818464] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1409.825739] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000016 [ 1409.992700] audit: type=1400 audit(1584886621.950:152): avc: denied { map } for pid=31581 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:17:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x100000000000000) 14:17:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80045440, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x45030000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x3, 0x4000, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r1, 0xc0245720, &(0x7f00000000c0)={0x1}) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x80800) open(&(0x7f0000000100)='./file0\x00', 0x80, 0x95) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 14:17:02 executing program 3 (fault-call:0 fault-nth:23): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x900}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1410.462974] FAULT_INJECTION: forcing a failure. [ 1410.462974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:17:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80086601, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x2, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x63a362ec) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1410.578323] CPU: 1 PID: 31595 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1410.586264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.595620] Call Trace: [ 1410.598222] dump_stack+0x188/0x20d [ 1410.601870] should_fail.cold+0xa/0x1b [ 1410.605774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1410.610912] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1410.615624] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1410.620662] ? __lock_is_held+0xad/0x140 [ 1410.624750] ? mon_bin_open+0x1a1/0x470 [ 1410.628746] alloc_pages_current+0xff/0x200 [ 1410.633084] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1410.637942] get_zeroed_page+0x10/0x40 [ 1410.641842] mon_alloc_buff+0xbc/0x190 [ 1410.645748] mon_bin_open+0x200/0x470 [ 1410.649570] ? mon_bin_fetch+0x330/0x330 [ 1410.653650] chrdev_open+0x219/0x5c0 [ 1410.657370] ? cdev_put.part.0+0x50/0x50 [ 1410.661464] ? security_file_open+0x162/0x1a0 [ 1410.665972] do_dentry_open+0x4a8/0x1160 [ 1410.670045] ? cdev_put.part.0+0x50/0x50 [ 1410.674116] ? security_inode_permission+0xc4/0xf0 [ 1410.679075] ? chown_common+0x550/0x550 [ 1410.683058] ? inode_permission+0xaf/0x550 [ 1410.687320] path_openat+0x1031/0x4200 [ 1410.691236] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1410.695941] do_filp_open+0x1a1/0x280 [ 1410.699761] ? may_open_dev+0xf0/0xf0 [ 1410.703567] ? find_held_lock+0x2d/0x110 [ 1410.707647] ? lock_downgrade+0x740/0x740 [ 1410.711801] ? __lock_is_held+0xad/0x140 [ 1410.715879] ? do_raw_spin_unlock+0x171/0x260 [ 1410.720381] ? _raw_spin_unlock+0x29/0x40 [ 1410.724532] ? __alloc_fd+0x43c/0x550 [ 1410.728438] do_sys_open+0x3c0/0x500 [ 1410.732275] ? filp_open+0x70/0x70 [ 1410.735834] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1410.740597] ? trace_hardirqs_off_caller+0x55/0x210 [ 1410.745626] ? do_syscall_64+0x21/0x620 [ 1410.749622] do_syscall_64+0xf9/0x620 [ 1410.753440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.758632] RIP: 0033:0x4165e1 14:17:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:02 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x880, 0x0) r1 = socket(0x2, 0x803, 0xff) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x14, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r4, 0x4) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r5, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1410.761829] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1410.780734] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1410.788447] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1410.795721] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1410.803009] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1410.810281] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1410.817571] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000017 14:17:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x200000000000000) 14:17:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xa00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x80087601, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r3 = open(0x0, 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r4, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$FBIOPUT_CON2FBMAP(r3, 0x4610, &(0x7f0000000040)={0x20}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ppoll(&(0x7f0000000100)=[{r5, 0x2040}, {r6, 0x4400}, {r7}, {r2, 0x1}, {r4, 0x20c1}, {0xffffffffffffffff, 0x6303}], 0x6, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={[0x3ff]}, 0x8) 14:17:03 executing program 3 (fault-call:0 fault-nth:24): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1411.380534] FAULT_INJECTION: forcing a failure. [ 1411.380534] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1411.423068] CPU: 0 PID: 31627 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1411.431001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.440360] Call Trace: [ 1411.442970] dump_stack+0x188/0x20d [ 1411.446615] should_fail.cold+0xa/0x1b [ 1411.450522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1411.455643] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1411.460325] ? find_held_lock+0x2d/0x110 [ 1411.464407] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1411.469437] ? __lock_is_held+0xad/0x140 [ 1411.473517] ? mon_bin_open+0x1a1/0x470 [ 1411.477507] alloc_pages_current+0xff/0x200 [ 1411.481832] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1411.486684] get_zeroed_page+0x10/0x40 [ 1411.490578] mon_alloc_buff+0xbc/0x190 [ 1411.494475] mon_bin_open+0x200/0x470 [ 1411.498286] ? mon_bin_fetch+0x330/0x330 [ 1411.502355] chrdev_open+0x219/0x5c0 [ 1411.506087] ? cdev_put.part.0+0x50/0x50 [ 1411.510165] ? security_file_open+0x162/0x1a0 [ 1411.514794] do_dentry_open+0x4a8/0x1160 [ 1411.518870] ? cdev_put.part.0+0x50/0x50 [ 1411.522944] ? security_inode_permission+0xc4/0xf0 [ 1411.527895] ? chown_common+0x550/0x550 [ 1411.531888] ? inode_permission+0xaf/0x550 [ 1411.536151] path_openat+0x1031/0x4200 [ 1411.540064] ? mark_held_locks+0xf0/0xf0 [ 1411.544151] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1411.548841] ? sctp_sendmsg_new_asoc+0x788/0xfd0 [ 1411.553612] do_filp_open+0x1a1/0x280 [ 1411.557430] ? may_open_dev+0xf0/0xf0 [ 1411.561244] ? find_held_lock+0x2d/0x110 [ 1411.565327] ? lock_downgrade+0x740/0x740 [ 1411.569575] ? __lock_is_held+0xad/0x140 14:17:03 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'veth0_virt_wifi\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000201}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB="34000000290000032cbd7000fcdbdf2500000000", @ANYRES32=r3, @ANYBLOB="00000f00e0ffe0ff0b000b0006140520362700000800010073667100"], 0x34}, 0x1, 0x0, 0x0, 0x8018}, 0x24008080) recvmsg$can_raw(r1, &(0x7f0000000400)={&(0x7f0000000040)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/92, 0x5c}, {&(0x7f0000000140)=""/164, 0xa4}, {&(0x7f0000000280)=""/143, 0x8f}], 0x3, &(0x7f0000000340)=""/156, 0x9c}, 0x40) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 14:17:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xb00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1411.573775] ? do_raw_spin_unlock+0x171/0x260 [ 1411.578281] ? _raw_spin_unlock+0x29/0x40 [ 1411.582439] ? __alloc_fd+0x43c/0x550 [ 1411.586262] do_sys_open+0x3c0/0x500 [ 1411.590061] ? filp_open+0x70/0x70 [ 1411.593629] ? __ia32_sys_clock_settime+0x260/0x260 [ 1411.598667] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1411.603434] ? trace_hardirqs_off_caller+0x55/0x210 [ 1411.608470] ? do_syscall_64+0x21/0x620 [ 1411.612462] do_syscall_64+0xf9/0x620 [ 1411.616278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1411.621495] RIP: 0033:0x4165e1 [ 1411.624698] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1411.643606] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1411.651324] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1411.658598] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1411.665883] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xc00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1411.673174] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1411.680448] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000018 14:17:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x300000000000000) 14:17:04 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) 14:17:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9effffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xe00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:04 executing program 3 (fault-call:0 fault-nth:25): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1412.270361] FAULT_INJECTION: forcing a failure. [ 1412.270361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1412.322227] CPU: 1 PID: 31665 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1412.330141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1412.339499] Call Trace: [ 1412.342103] dump_stack+0x188/0x20d [ 1412.345752] should_fail.cold+0xa/0x1b [ 1412.349665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1412.354801] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1412.359484] ? find_held_lock+0x2d/0x110 [ 1412.363562] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1412.368600] ? __lock_is_held+0xad/0x140 [ 1412.372683] ? mon_bin_open+0x1a1/0x470 [ 1412.376676] alloc_pages_current+0xff/0x200 [ 1412.381011] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1412.385880] get_zeroed_page+0x10/0x40 [ 1412.389780] mon_alloc_buff+0xbc/0x190 [ 1412.393703] mon_bin_open+0x200/0x470 [ 1412.397514] ? mon_bin_fetch+0x330/0x330 [ 1412.401583] chrdev_open+0x219/0x5c0 [ 1412.405309] ? cdev_put.part.0+0x50/0x50 [ 1412.409387] ? security_file_open+0x162/0x1a0 [ 1412.413901] do_dentry_open+0x4a8/0x1160 [ 1412.417974] ? cdev_put.part.0+0x50/0x50 [ 1412.422049] ? security_inode_permission+0xc4/0xf0 [ 1412.426993] ? chown_common+0x550/0x550 [ 1412.430991] ? inode_permission+0xaf/0x550 [ 1412.435262] path_openat+0x1031/0x4200 [ 1412.439162] ? mark_held_locks+0xf0/0xf0 [ 1412.443233] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1412.447948] do_filp_open+0x1a1/0x280 [ 1412.451763] ? may_open_dev+0xf0/0xf0 [ 1412.455575] ? find_held_lock+0x2d/0x110 [ 1412.459660] ? lock_downgrade+0x740/0x740 [ 1412.463816] ? __lock_is_held+0xad/0x140 [ 1412.467893] ? do_raw_spin_unlock+0x171/0x260 14:17:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1412.472422] ? _raw_spin_unlock+0x29/0x40 [ 1412.476585] ? __alloc_fd+0x43c/0x550 [ 1412.480412] do_sys_open+0x3c0/0x500 [ 1412.484148] ? filp_open+0x70/0x70 [ 1412.487703] ? __ia32_sys_clock_settime+0x260/0x260 [ 1412.492730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1412.497494] ? trace_hardirqs_off_caller+0x55/0x210 [ 1412.502527] ? do_syscall_64+0x21/0x620 [ 1412.506517] do_syscall_64+0xf9/0x620 [ 1412.510334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1412.515535] RIP: 0033:0x4165e1 14:17:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x4, 0x0, 0x0}) [ 1412.518735] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1412.537642] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1412.545357] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1412.552628] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1412.559902] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xe1c}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1412.567179] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1412.574458] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000019 14:17:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf00000000000000) 14:17:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$FBIOGET_CON2FBMAP(0xffffffffffffffff, 0x460f, &(0x7f00000015c0)={0x2f, 0x2}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001600)='/dev/ubi_ctrl\x00', 0x2101c2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000001580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001540)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1474}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 14:17:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x3e, 0x0, 0x0}) 14:17:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:05 executing program 3 (fault-call:0 fault-nth:26): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x1c0e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1413.182594] FAULT_INJECTION: forcing a failure. [ 1413.182594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1413.233894] CPU: 0 PID: 31700 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1413.241820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.251180] Call Trace: [ 1413.253778] dump_stack+0x188/0x20d [ 1413.257436] should_fail.cold+0xa/0x1b [ 1413.261351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1413.266481] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1413.271174] ? find_held_lock+0x2d/0x110 [ 1413.275246] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1413.280276] ? __lock_is_held+0xad/0x140 [ 1413.284350] ? mon_bin_open+0x1a1/0x470 [ 1413.288349] alloc_pages_current+0xff/0x200 [ 1413.292673] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1413.297528] get_zeroed_page+0x10/0x40 [ 1413.301420] mon_alloc_buff+0xbc/0x190 [ 1413.305325] mon_bin_open+0x200/0x470 [ 1413.309132] ? mon_bin_fetch+0x330/0x330 [ 1413.313195] chrdev_open+0x219/0x5c0 [ 1413.316909] ? cdev_put.part.0+0x50/0x50 [ 1413.320973] ? security_file_open+0x162/0x1a0 [ 1413.325485] do_dentry_open+0x4a8/0x1160 [ 1413.329555] ? cdev_put.part.0+0x50/0x50 [ 1413.333631] ? security_inode_permission+0xc4/0xf0 [ 1413.338577] ? chown_common+0x550/0x550 [ 1413.342551] ? inode_permission+0xaf/0x550 [ 1413.346801] path_openat+0x1031/0x4200 [ 1413.350716] ? mark_held_locks+0xf0/0xf0 [ 1413.354787] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1413.359481] do_filp_open+0x1a1/0x280 [ 1413.363435] ? may_open_dev+0xf0/0xf0 [ 1413.367246] ? find_held_lock+0x2d/0x110 [ 1413.371322] ? lock_downgrade+0x740/0x740 [ 1413.375483] ? __lock_is_held+0xad/0x140 [ 1413.379554] ? do_raw_spin_unlock+0x171/0x260 [ 1413.384056] ? _raw_spin_unlock+0x29/0x40 [ 1413.388204] ? __alloc_fd+0x43c/0x550 [ 1413.392034] do_sys_open+0x3c0/0x500 [ 1413.395774] ? filp_open+0x70/0x70 [ 1413.399324] ? __ia32_sys_clock_settime+0x260/0x260 [ 1413.404355] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1413.409121] ? trace_hardirqs_off_caller+0x55/0x210 [ 1413.414150] ? do_syscall_64+0x21/0x620 [ 1413.418141] do_syscall_64+0xf9/0x620 [ 1413.421957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1413.427159] RIP: 0033:0x4165e1 [ 1413.430365] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1413.449361] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1413.457077] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1413.464353] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1413.471630] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x5865}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x3e00, 0x0, 0x0}) 14:17:05 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xfd, 0x0, 0xca, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1b) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000240)) unshare(0x4a000600) listen(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040), 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000040)={0xfff6, 0x0, [0xfff7, 0x64fa, 0x5, 0x0, 0x7], 0x67dc}) 14:17:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1413.478907] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1413.479306] IPVS: ftp: loaded support on port[0] = 21 [ 1413.486177] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000001a [ 1413.677980] IPVS: ftp: loaded support on port[0] = 21 14:17:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x3f00000000000000) 14:17:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x6000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:06 executing program 3 (fault-call:0 fault-nth:27): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:06 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1c000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x1, 0x0}) 14:17:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1414.105736] FAULT_INJECTION: forcing a failure. [ 1414.105736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1414.152293] CPU: 0 PID: 31735 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1414.160219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.169579] Call Trace: [ 1414.172183] dump_stack+0x188/0x20d [ 1414.175826] should_fail.cold+0xa/0x1b [ 1414.179751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1414.184881] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1414.189562] ? find_held_lock+0x2d/0x110 [ 1414.193638] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1414.198683] ? __lock_is_held+0xad/0x140 [ 1414.202756] ? mon_bin_open+0x1a1/0x470 [ 1414.206750] alloc_pages_current+0xff/0x200 [ 1414.211082] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1414.215935] get_zeroed_page+0x10/0x40 [ 1414.219836] mon_alloc_buff+0xbc/0x190 [ 1414.223740] mon_bin_open+0x200/0x470 [ 1414.227553] ? mon_bin_fetch+0x330/0x330 [ 1414.231635] chrdev_open+0x219/0x5c0 [ 1414.235368] ? cdev_put.part.0+0x50/0x50 [ 1414.239447] ? security_file_open+0x162/0x1a0 [ 1414.243958] do_dentry_open+0x4a8/0x1160 [ 1414.248030] ? cdev_put.part.0+0x50/0x50 [ 1414.252103] ? security_inode_permission+0xc4/0xf0 [ 1414.257037] ? chown_common+0x550/0x550 [ 1414.261017] ? inode_permission+0xaf/0x550 [ 1414.265287] path_openat+0x1031/0x4200 [ 1414.269205] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1414.273903] do_filp_open+0x1a1/0x280 [ 1414.277722] ? may_open_dev+0xf0/0xf0 [ 1414.281537] ? find_held_lock+0x2d/0x110 [ 1414.285619] ? lock_downgrade+0x740/0x740 [ 1414.289783] ? __lock_is_held+0xad/0x140 [ 1414.293862] ? do_raw_spin_unlock+0x171/0x260 [ 1414.298375] ? _raw_spin_unlock+0x29/0x40 [ 1414.302547] ? __alloc_fd+0x43c/0x550 [ 1414.306368] do_sys_open+0x3c0/0x500 [ 1414.310096] ? filp_open+0x70/0x70 [ 1414.313659] ? __ia32_sys_clock_settime+0x260/0x260 [ 1414.318692] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1414.323473] ? trace_hardirqs_off_caller+0x55/0x210 [ 1414.328499] ? do_syscall_64+0x21/0x620 [ 1414.332492] do_syscall_64+0xf9/0x620 [ 1414.336301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1414.341491] RIP: 0033:0x4165e1 14:17:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x4, 0x0}) 14:17:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x6558}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x2, 0x9, 0x4, 0x200000, 0x8, {0x77359400}, {0x1, 0x8, 0x6, 0xff, 0xb9, 0x20, "2ec1209d"}, 0x81, 0x1, @planes=&(0x7f0000000040)={0x2c9, 0x202dc48c, @userptr=0x700000000000, 0x2}, 0x7, 0x0, 0xffffffffffffffff}) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x9c, 0xd, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x4}, [@IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20008052}, 0x40) 14:17:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x8100}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x3e, 0x0}) [ 1414.344688] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1414.363591] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1414.371306] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1414.378579] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1414.385850] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1414.393123] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1414.400424] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000001b 14:17:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x4000000000000000) 14:17:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xb600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:06 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x28, 0x9, 0x6, 0xc8aa60532c845caf, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000840}, 0x4890) ioctl$KIOCSOUND(r1, 0x4b2f, 0x6) 14:17:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x3e00, 0x0}) 14:17:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:06 executing program 3 (fault-call:0 fault-nth:28): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x1}, 0x10) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1415.052912] FAULT_INJECTION: forcing a failure. [ 1415.052912] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:17:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x15, 0x100, 0x70bd2a, 0x25dfdbfe, {0x8, 0x4}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x50, 0x1, "7dbbb17204942732a828ee8a8c86a06ca6adaec67c267a79956326303dbd9e3af8ee894ab6dd67bdf7d7d36d4d5e8730ff85bf56f26007849210ba1698b3f387a1f2b9c03cfb8268c9980e01"}]}, 0x68}, 0x1, 0x0, 0x0, 0x1000401c}, 0x800) 14:17:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1415.103792] CPU: 0 PID: 31775 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1415.111788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.121139] Call Trace: [ 1415.123728] dump_stack+0x188/0x20d [ 1415.127368] should_fail.cold+0xa/0x1b [ 1415.131270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1415.136392] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1415.141070] ? find_held_lock+0x2d/0x110 [ 1415.145145] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1415.150170] ? __lock_is_held+0xad/0x140 [ 1415.154232] ? mon_bin_open+0x1a1/0x470 [ 1415.158209] alloc_pages_current+0xff/0x200 [ 1415.162553] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1415.167411] get_zeroed_page+0x10/0x40 [ 1415.171315] mon_alloc_buff+0xbc/0x190 [ 1415.175214] mon_bin_open+0x200/0x470 [ 1415.179014] ? mon_bin_fetch+0x330/0x330 [ 1415.183066] chrdev_open+0x219/0x5c0 [ 1415.186784] ? cdev_put.part.0+0x50/0x50 [ 1415.190857] ? security_file_open+0x162/0x1a0 [ 1415.195362] do_dentry_open+0x4a8/0x1160 [ 1415.199441] ? cdev_put.part.0+0x50/0x50 [ 1415.203509] ? security_inode_permission+0xc4/0xf0 [ 1415.208448] ? chown_common+0x550/0x550 [ 1415.212430] ? inode_permission+0xaf/0x550 [ 1415.216677] path_openat+0x1031/0x4200 [ 1415.220590] ? mark_held_locks+0xf0/0xf0 [ 1415.224671] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1415.229364] do_filp_open+0x1a1/0x280 [ 1415.233172] ? may_open_dev+0xf0/0xf0 [ 1415.236976] ? find_held_lock+0x2d/0x110 [ 1415.241054] ? lock_downgrade+0x740/0x740 [ 1415.245214] ? __lock_is_held+0xad/0x140 [ 1415.249282] ? do_raw_spin_unlock+0x171/0x260 [ 1415.253788] ? _raw_spin_unlock+0x29/0x40 [ 1415.257938] ? __alloc_fd+0x43c/0x550 [ 1415.261758] do_sys_open+0x3c0/0x500 [ 1415.265481] ? filp_open+0x70/0x70 [ 1415.269032] ? __ia32_sys_clock_settime+0x260/0x260 [ 1415.274063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1415.278825] ? trace_hardirqs_off_caller+0x55/0x210 [ 1415.283855] ? do_syscall_64+0x21/0x620 [ 1415.287843] do_syscall_64+0xf9/0x620 [ 1415.291660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1415.296852] RIP: 0033:0x4165e1 14:17:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x34000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x6, 0x1, 0x4}, 0xc) [ 1415.300044] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1415.318942] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1415.326673] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1415.333944] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1415.341219] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1415.348495] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1415.355770] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000001c 14:17:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x5119000000000000) 14:17:07 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x400300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000040)={0x0, 0x9, 0x0}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x19) 14:17:07 executing program 3 (fault-call:0 fault-nth:29): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1415.970511] FAULT_INJECTION: forcing a failure. [ 1415.970511] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1416.013858] CPU: 1 PID: 31808 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1416.021766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.031272] Call Trace: [ 1416.033874] dump_stack+0x188/0x20d [ 1416.037528] should_fail.cold+0xa/0x1b [ 1416.041435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1416.046570] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1416.051249] ? find_held_lock+0x2d/0x110 [ 1416.055327] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1416.060360] ? __lock_is_held+0xad/0x140 [ 1416.064439] ? mon_bin_open+0x1a1/0x470 [ 1416.068429] alloc_pages_current+0xff/0x200 [ 1416.072774] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1416.077626] get_zeroed_page+0x10/0x40 [ 1416.081526] mon_alloc_buff+0xbc/0x190 [ 1416.085433] mon_bin_open+0x200/0x470 [ 1416.089247] ? mon_bin_fetch+0x330/0x330 [ 1416.093315] chrdev_open+0x219/0x5c0 [ 1416.097038] ? cdev_put.part.0+0x50/0x50 [ 1416.101140] ? security_file_open+0x162/0x1a0 [ 1416.105639] do_dentry_open+0x4a8/0x1160 [ 1416.109703] ? cdev_put.part.0+0x50/0x50 [ 1416.113773] ? security_inode_permission+0xc4/0xf0 [ 1416.118712] ? chown_common+0x550/0x550 [ 1416.122690] ? inode_permission+0xaf/0x550 [ 1416.126947] path_openat+0x1031/0x4200 [ 1416.130861] ? mark_held_locks+0xf0/0xf0 [ 1416.134936] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1416.139633] do_filp_open+0x1a1/0x280 [ 1416.143458] ? may_open_dev+0xf0/0xf0 [ 1416.147262] ? find_held_lock+0x2d/0x110 [ 1416.151335] ? lock_downgrade+0x740/0x740 [ 1416.155591] ? __lock_is_held+0xad/0x140 [ 1416.159677] ? do_raw_spin_unlock+0x171/0x260 [ 1416.164180] ? _raw_spin_unlock+0x29/0x40 [ 1416.168338] ? __alloc_fd+0x43c/0x550 [ 1416.172153] do_sys_open+0x3c0/0x500 [ 1416.175874] ? filp_open+0x70/0x70 [ 1416.179426] ? __ia32_sys_clock_settime+0x260/0x260 [ 1416.184451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1416.189208] ? trace_hardirqs_off_caller+0x55/0x210 [ 1416.194230] ? do_syscall_64+0x21/0x620 [ 1416.198227] do_syscall_64+0xf9/0x620 [ 1416.202044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1416.207236] RIP: 0033:0x4165e1 14:17:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x1000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x2000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1416.210434] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1416.229340] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1416.237048] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1416.244324] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1416.251594] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000100)) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001380)=ANY=[@ANYBLOB="580e000030003dfa000000000000000000000000440e0100400e01000a00010070656469740000002c0e02800800058004000680200e040000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002b06000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000600e44f9262467382967cb640787915c0aac14a4cbbede0a7985b0b80ffdf32126f00a76b34f4d3c316bcc5bdeb5019f1e80b2ba1c2059842a8152bed8ad7dc67a31a9eae40a4a42ec0219b9b4a9ccabf4adac8cc5e6d23eea3881009a8ac5152f417e3a1a4b4d89cc45bfd27007fab"], 0xe58}}, 0x0) splice(r0, &(0x7f0000000040)=0x23ba11b1, r1, &(0x7f0000000080), 0x1, 0xb) socket$inet6_tcp(0xa, 0x1, 0x0) 14:17:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f00000000c0)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r1, 0xc06c4124, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) [ 1416.258867] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1416.266142] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000001d 14:17:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x980f000000000000) 14:17:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x3000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0xd, 0x0}) 14:17:08 executing program 3 (fault-call:0 fault-nth:30): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x350, 0x1, [0x4835]}, &(0x7f0000000080)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x800}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fadvise64(r2, 0x1ff, 0x54fc, 0x4) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1416.878091] FAULT_INJECTION: forcing a failure. [ 1416.878091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1416.930831] CPU: 0 PID: 31849 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1416.938766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.948137] Call Trace: [ 1416.950742] dump_stack+0x188/0x20d [ 1416.954399] should_fail.cold+0xa/0x1b [ 1416.958310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1416.963449] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1416.968132] ? find_held_lock+0x2d/0x110 [ 1416.972208] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1416.977245] ? __lock_is_held+0xad/0x140 [ 1416.981430] ? mon_bin_open+0x1a1/0x470 [ 1416.985417] alloc_pages_current+0xff/0x200 [ 1416.989750] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1416.994609] get_zeroed_page+0x10/0x40 [ 1416.998508] mon_alloc_buff+0xbc/0x190 [ 1417.002416] mon_bin_open+0x200/0x470 [ 1417.006236] ? mon_bin_fetch+0x330/0x330 [ 1417.010308] chrdev_open+0x219/0x5c0 [ 1417.014038] ? cdev_put.part.0+0x50/0x50 [ 1417.018124] ? security_file_open+0x162/0x1a0 [ 1417.022652] do_dentry_open+0x4a8/0x1160 [ 1417.026725] ? cdev_put.part.0+0x50/0x50 [ 1417.030800] ? security_inode_permission+0xc4/0xf0 [ 1417.035741] ? chown_common+0x550/0x550 [ 1417.039730] ? inode_permission+0xaf/0x550 [ 1417.043987] path_openat+0x1031/0x4200 [ 1417.047905] ? mark_held_locks+0xf0/0xf0 [ 1417.051979] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1417.056677] do_filp_open+0x1a1/0x280 [ 1417.060490] ? may_open_dev+0xf0/0xf0 [ 1417.064302] ? find_held_lock+0x2d/0x110 [ 1417.068380] ? lock_downgrade+0x740/0x740 [ 1417.072541] ? __lock_is_held+0xad/0x140 [ 1417.076616] ? do_raw_spin_unlock+0x171/0x260 [ 1417.081142] ? _raw_spin_unlock+0x29/0x40 [ 1417.085302] ? __alloc_fd+0x43c/0x550 [ 1417.089123] do_sys_open+0x3c0/0x500 [ 1417.092844] ? filp_open+0x70/0x70 [ 1417.096399] ? __ia32_sys_clock_settime+0x260/0x260 [ 1417.101429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1417.106198] ? trace_hardirqs_off_caller+0x55/0x210 [ 1417.111221] ? do_syscall_64+0x21/0x620 [ 1417.115226] do_syscall_64+0xf9/0x620 [ 1417.119042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1417.124231] RIP: 0033:0x4165e1 [ 1417.127520] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1417.146424] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1417.154137] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1417.161438] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1417.168712] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x204ec0, 0xb) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000040)=0x80000001) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001340)=ANY=[@ANYRESHEX=r2], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r5 = dup(r2) ioctl$VIDIOC_S_TUNER(r5, 0x4054561e, &(0x7f0000000180)={0x8, "a3098ae595ffa997439f933fb820013605928ef14d52bf529fe808c337d34dc6", 0x4, 0x2, 0x8000, 0x5, 0x10, 0x4, 0x5, 0x5}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000340)=""/235) 14:17:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) connect$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x2}}, 0x10) 14:17:09 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000040)={0x0, 0x0, 0x0}) 14:17:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:09 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) listen(r1, 0x1000) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) readahead(r2, 0xa4, 0x2) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x4000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1417.175994] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1417.183274] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000001e 14:17:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x9effffff00000000) 14:17:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x5000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:09 executing program 3 (fault-call:0 fault-nth:31): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)={0x9, 0x3, 0x4, 0x800, 0xffff, {0x77359400}, {0x4, 0x1, 0xbb, 0xd1, 0x1, 0x3, "de863a81"}, 0x7fffffff, 0x3, @fd, 0x0, 0x0, r2}) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000040)) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x313, 0x4) [ 1417.876008] FAULT_INJECTION: forcing a failure. [ 1417.876008] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1417.920700] CPU: 0 PID: 31885 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1417.928629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.938005] Call Trace: [ 1417.940599] dump_stack+0x188/0x20d [ 1417.944256] should_fail.cold+0xa/0x1b [ 1417.948156] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1417.953280] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1417.957960] ? find_held_lock+0x2d/0x110 [ 1417.962036] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1417.967078] ? __lock_is_held+0xad/0x140 [ 1417.971154] ? mon_bin_open+0x1a1/0x470 [ 1417.975143] alloc_pages_current+0xff/0x200 [ 1417.979473] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1417.984332] get_zeroed_page+0x10/0x40 [ 1417.988229] mon_alloc_buff+0xbc/0x190 [ 1417.992131] mon_bin_open+0x200/0x470 [ 1417.995948] ? mon_bin_fetch+0x330/0x330 [ 1418.000013] chrdev_open+0x219/0x5c0 [ 1418.003734] ? cdev_put.part.0+0x50/0x50 [ 1418.007811] ? security_file_open+0x162/0x1a0 [ 1418.012315] do_dentry_open+0x4a8/0x1160 [ 1418.016380] ? cdev_put.part.0+0x50/0x50 [ 1418.020446] ? security_inode_permission+0xc4/0xf0 [ 1418.025379] ? chown_common+0x550/0x550 [ 1418.029351] ? inode_permission+0xaf/0x550 [ 1418.033600] path_openat+0x1031/0x4200 [ 1418.037507] ? mark_held_locks+0xf0/0xf0 [ 1418.041585] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1418.046274] do_filp_open+0x1a1/0x280 [ 1418.050089] ? may_open_dev+0xf0/0xf0 [ 1418.053898] ? find_held_lock+0x2d/0x110 [ 1418.057982] ? lock_downgrade+0x740/0x740 [ 1418.062136] ? __lock_is_held+0xad/0x140 [ 1418.066214] ? do_raw_spin_unlock+0x171/0x260 [ 1418.070720] ? _raw_spin_unlock+0x29/0x40 [ 1418.074877] ? __alloc_fd+0x43c/0x550 [ 1418.078693] do_sys_open+0x3c0/0x500 [ 1418.082412] ? filp_open+0x70/0x70 [ 1418.085963] ? __ia32_sys_clock_settime+0x260/0x260 [ 1418.090990] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1418.095767] ? trace_hardirqs_off_caller+0x55/0x210 [ 1418.100792] ? do_syscall_64+0x21/0x620 [ 1418.104778] do_syscall_64+0xf9/0x620 [ 1418.108600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1418.113804] RIP: 0033:0x4165e1 [ 1418.117002] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1418.135907] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1418.143622] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1418.150894] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1418.158165] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 14:17:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1418.165442] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1418.172712] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 000000000000001f 14:17:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000040)={0x4, 0x50, 0x0}) 14:17:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x8000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xe000000000000000) 14:17:10 executing program 3 (fault-call:0 fault-nth:32): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x9000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDDISABIO(r0, 0x4b37) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000040)) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80011002}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x1403, 0x100, 0x70bd2b, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macsec0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x50}, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xa000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xb000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:11 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x0, 0x100) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="78000000040a050000000000000000000d0000070900010073797a30000000000900010073797a31000000004c0008800c00014000000000000001d70c00024000a1c6fb160000070c00014000000000000000040c000178daffffffffffff010c00014084d8000000401d090c00f3400000000000000001"], 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x20000040) syz_extract_tcp_res$synack(&(0x7f00000001c0), 0x1, 0x0) [ 1419.158043] FAULT_INJECTION: forcing a failure. [ 1419.158043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1419.183877] CPU: 1 PID: 31923 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1419.191798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.201274] Call Trace: [ 1419.203890] dump_stack+0x188/0x20d [ 1419.207544] should_fail.cold+0xa/0x1b [ 1419.211454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1419.216583] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1419.221269] ? find_held_lock+0x2d/0x110 [ 1419.225346] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1419.230372] ? __lock_is_held+0xad/0x140 [ 1419.234456] ? mon_bin_open+0x1a1/0x470 [ 1419.238447] alloc_pages_current+0xff/0x200 [ 1419.242790] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1419.247645] get_zeroed_page+0x10/0x40 [ 1419.251542] mon_alloc_buff+0xbc/0x190 [ 1419.255448] mon_bin_open+0x200/0x470 [ 1419.259262] ? mon_bin_fetch+0x330/0x330 [ 1419.263332] chrdev_open+0x219/0x5c0 [ 1419.267052] ? cdev_put.part.0+0x50/0x50 [ 1419.271132] ? security_file_open+0x162/0x1a0 [ 1419.275639] do_dentry_open+0x4a8/0x1160 [ 1419.279707] ? cdev_put.part.0+0x50/0x50 [ 1419.283777] ? security_inode_permission+0xc4/0xf0 [ 1419.288713] ? chown_common+0x550/0x550 [ 1419.292698] ? inode_permission+0xaf/0x550 [ 1419.296948] path_openat+0x1031/0x4200 [ 1419.300866] ? mark_held_locks+0xf0/0xf0 [ 1419.304943] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1419.309649] do_filp_open+0x1a1/0x280 [ 1419.313466] ? may_open_dev+0xf0/0xf0 [ 1419.317277] ? find_held_lock+0x2d/0x110 [ 1419.321351] ? lock_downgrade+0x740/0x740 [ 1419.325509] ? __lock_is_held+0xad/0x140 [ 1419.329593] ? do_raw_spin_unlock+0x171/0x260 [ 1419.334134] ? _raw_spin_unlock+0x29/0x40 [ 1419.338300] ? __alloc_fd+0x43c/0x550 [ 1419.342120] do_sys_open+0x3c0/0x500 [ 1419.345844] ? filp_open+0x70/0x70 [ 1419.349391] ? __ia32_sys_clock_settime+0x260/0x260 [ 1419.354407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1419.359169] ? trace_hardirqs_off_caller+0x55/0x210 [ 1419.364285] ? do_syscall_64+0x21/0x620 [ 1419.368271] do_syscall_64+0xf9/0x620 [ 1419.372090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.377285] RIP: 0033:0x4165e1 [ 1419.380481] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1419.399407] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:17:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1419.407128] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1419.414398] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1419.421677] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1419.428961] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1419.436291] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000020 14:17:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xc000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x4, 0x8, 0x0, 0x0, 0xfffffffffffffffe, 0x1}) 14:17:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xf0ffffff00000000) 14:17:11 executing program 3 (fault-call:0 fault-nth:33): syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xe000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1419.904499] FAULT_INJECTION: forcing a failure. [ 1419.904499] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1419.939442] CPU: 0 PID: 31949 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1419.947354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.956707] Call Trace: [ 1419.959305] dump_stack+0x188/0x20d [ 1419.962945] should_fail.cold+0xa/0x1b [ 1419.966847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1419.971967] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1419.976647] ? find_held_lock+0x2d/0x110 [ 1419.980727] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1419.985762] ? __lock_is_held+0xad/0x140 [ 1419.989841] ? mon_bin_open+0x1a1/0x470 [ 1419.993833] alloc_pages_current+0xff/0x200 [ 1419.998162] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1420.003009] get_zeroed_page+0x10/0x40 [ 1420.006903] mon_alloc_buff+0xbc/0x190 [ 1420.010801] mon_bin_open+0x200/0x470 [ 1420.014605] ? mon_bin_fetch+0x330/0x330 [ 1420.018661] chrdev_open+0x219/0x5c0 [ 1420.022392] ? cdev_put.part.0+0x50/0x50 [ 1420.026460] ? security_file_open+0x162/0x1a0 [ 1420.030957] do_dentry_open+0x4a8/0x1160 [ 1420.035022] ? cdev_put.part.0+0x50/0x50 [ 1420.039086] ? security_inode_permission+0xc4/0xf0 [ 1420.044013] ? chown_common+0x550/0x550 [ 1420.047994] ? inode_permission+0xaf/0x550 [ 1420.052245] path_openat+0x1031/0x4200 [ 1420.056157] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1420.060855] do_filp_open+0x1a1/0x280 [ 1420.064663] ? may_open_dev+0xf0/0xf0 [ 1420.068463] ? find_held_lock+0x2d/0x110 [ 1420.072539] ? lock_downgrade+0x740/0x740 [ 1420.076688] ? __lock_is_held+0xad/0x140 [ 1420.080756] ? do_raw_spin_unlock+0x171/0x260 [ 1420.085260] ? _raw_spin_unlock+0x29/0x40 [ 1420.089410] ? __alloc_fd+0x43c/0x550 [ 1420.093224] do_sys_open+0x3c0/0x500 [ 1420.096960] ? filp_open+0x70/0x70 [ 1420.100513] ? __ia32_sys_clock_settime+0x260/0x260 [ 1420.105534] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1420.110295] ? trace_hardirqs_off_caller+0x55/0x210 [ 1420.115318] ? do_syscall_64+0x21/0x620 [ 1420.119295] do_syscall_64+0xf9/0x620 [ 1420.123123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1420.128313] RIP: 0033:0x4165e1 [ 1420.131513] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:17:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:12 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f00000002c0)={{0x0, @name="cc8f36222597d9930d4f532dea48a78c92f924cce99189eafd5cad4aa8bb0d94"}, 0x8, 0x7fffffff, 0x7}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="a0718d240c0500fcd7e6f08534df8d6fa9d8b25f8de26013ad35dd29413d2e047a06e68b3ad508cdf8d3094ee6087b36ccd9b004eeefc7b9105abf07692ab4b89007d1a401f1466adc61ea6f5764e3b90d0004d5f4334fbf1fc3ce9c2c846e89426a81af1ce40b52d76632fc245661aca7c587a53f00fd5b1fe5d5d873ed0ccf2f18c700"/147], &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x1ff, 0x80000001, 0x5, 0x20, 0x8, 0x80}, 0x9c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r2 = open(0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) keyctl$KEYCTL_MOVE(0x1e, 0x0, r3, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r7 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000180)={0x10001, 0x0, 0x4, 0x400, 0x6ef7, {r5, r6/1000+30000}, {0x4, 0x1, 0x1, 0x1, 0x5, 0x40, "a1d493dd"}, 0x2, 0x2, @fd=r7, 0x8000, 0x0, r1}) ioctl$SG_GET_KEEP_ORPHAN(r8, 0x2288, &(0x7f0000000280)) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000040)) [ 1420.150415] RSP: 002b:00007f1fae6857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1420.158131] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004165e1 [ 1420.165408] RDX: 0000000000000000 RSI: 0000000000004a02 RDI: 00007f1fae685850 [ 1420.172683] RBP: 000000000076bf00 R08: 000000000000000f R09: 0000000000000000 [ 1420.179956] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 1420.187242] R13: 0000000000000c10 R14: 00000000004ce3bc R15: 0000000000000021 14:17:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x8, 0xfffc, 0x203, 0x29c, 0x1, 0x4}) 14:17:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x10000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:12 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x18) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xffffffff00000000) 14:17:12 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x345}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:13 executing program 4: syz_mount_image$cifs(&(0x7f0000000040)='cifs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="c59c39c40a7b64140f8dd8190bf7c9d339d2be27222454380cc80046b046f524c5bb2a8ada2c3922a2bf0f3370275784e191e0a2c2ee6b5677aafb44cb2b7bb04ac1973e9f48a4143566886848437de28e805b9eadfc1f7fb3aeff8a34e769cb6a56b6a10ee437ceeb21390401bf61c62577c333927ffde0de5387a2c322e4a74732379b74fbeeb8aa3a9f49d1b5b85522a62dc8a314f6bd3a9320c14a6af0e3798ee72c321da35aaa0aedc7fc941a0eda65238ee064acf018e0e27a4f8ebed62ca223367713bd47e705c80c4032174e94c7150a3086ba3609080d879c8b8bce83d2766d6cac", 0xe6, 0x4}, {&(0x7f00000001c0)="ab8404f1eb693c9509723e4a492ba217a3d68f9c5e2f310cc32277252d7eb6b7cbc7627e972e91184917d07f948f720caba5449c7fd16d72dd00ad2041bdc310431b33f5b41ff5f4b125e052a707cb38f788d2e890952491ce90bf51f4accc281926845a9f727be36b8229dfa4e78ecd3b7bfd0011f8614b54bb817f6daa58f1026a4c16f5253a04eae2a4cdee97ee774ea06e053bdde8ff071a4c59c628a2db8b2a91dffaf061d2ee25dbc5f99b15e851e912367588b1840972f78df8819ef83087fc88cd4a339df76eac9e55cd80f2c8600adb0aed1f2d", 0xd8, 0x4}, {&(0x7f00000002c0)="88fb61ad5507070f5b760cd7dc6326a66c0d2cba71564b8da679a4350310", 0x1e, 0x2}], 0x200000, &(0x7f0000000380)='md5suma\'cpuset\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000440)={0x5, 0xa, 0x4, 0x400, 0x401, {r1, r2/1000+30000}, {0x2, 0xc, 0x2, 0x40, 0x81, 0x7, "dda0d76b"}, 0x40, 0x2, @fd=r3, 0x2}) r4 = open(0x0, 0x0, 0x22) r5 = open(0x0, 0x2, 0x20) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$IPSET_CMD_DESTROY(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000840)=ANY=[@ANYBLOB="5400000003060108000000958b855bc45716dd74904d00000000000100000605000100070000000900020073797a32000000000900020073797a31000000000900020073797a32000000000900020073797a320000004005000100240900009c8c3be0b435bae17ef9980a4cb90a16739a485634da2d006d65b21f04d8efb6ab279982599fe9c30dc0e21d1b4176febc097594377ac2799357633cb4340972e0d0555f3e56f3e45199cfc2af398ea56a2e184978a75804126c0e5d2b9ea35450e58199402612030c49a06ae3de399f31ecbb58cd625e1e9e1a0f1ab2532c735c6a12de0c23448cf5a9ad1b73530e76c22c8f188aa0bda6"], 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x10) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000004c0)={0x2, 0x0, [{0x6, 0x3ff, 0x0, 0x4, 0xae87}, {0x7, 0x4, 0x7, 0x3, 0x6}]}) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0x58, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvlan0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4801) r6 = open(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000680)={0x401, 0x3d, 0xffffffffffffffe0, 0x0, 0xbfd, 0x6, 0x2, 0x40}, &(0x7f00000006c0)={0x1, 0x400, 0x2, 0x9, 0x0, 0x618, 0x4, 0x2}, &(0x7f0000000700)={0x5, 0xffffffffffff0000, 0x200, 0x6, 0x7, 0x9, 0xfffffffffffffff7, 0x1ef7}, &(0x7f0000000780)={r7, r8+30000000}, &(0x7f0000000800)={&(0x7f00000007c0)={[0x6]}, 0x8}) openat$cgroup_procs(r6, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$BLKPBSZGET(r6, 0x127b, &(0x7f0000000500)) ioctl$PIO_FONTX(r3, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000003c0)={0x6, 0x8000, 0x6, 0x101, 0x7, 0xbb4}) 14:17:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x60000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:13 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x4a02) [ 1421.223325] CIFS VFS: Malformed UNC in devname. 14:17:13 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x4a02) 14:17:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1421.307377] CIFS VFS: Malformed UNC in devname. 14:17:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x65580000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:13 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x4a02) 14:17:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0xfffffffffffff000) 14:17:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x81000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x9, 0x0}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x200) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getpeername$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0xfffffffffffffeb9) 14:17:13 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x300, 0x4a02) 14:17:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6b6b6b, 0x4a02) 14:17:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x9effffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xb6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1000000, 0x4a02) 14:17:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x6, 0x4) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0xfff, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x30, r6, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x3}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz0\x00'}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r6, 0x1, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x18, 0x17, {0x18, 0x0, @udp='udp:syz1\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6800000002060100000000000000000000000000120003006269746d61703a69702c6d616300000005000400000000000900020073797a300000ca00000000000000028008000140000000000c000180080001400000000005000500020000000500010006000000"], 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2000000, 0x4a02) 14:17:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1422.757903] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 14:17:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3000000, 0x4a02) 14:17:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x5, 0x0, 0x10) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0xf, 0x0}) r2 = open(0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0x7fffffff, 0x4) openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000040)=""/131) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) recvfrom$l2tp6(r4, &(0x7f0000000280)=""/173, 0xad, 0x10000, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x20) 14:17:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xffffa888}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4000000, 0x4a02) 14:17:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xfffff000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6b6b6b00, 0x4a02) 14:17:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xf6ffffff, 0x4a02) 14:17:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x6) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = socket(0x2, 0x803, 0xff) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x14, &(0x7f0000000000)={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000040)={r6, @in={{0x2, 0x4e20, @remote}}}, 0x84) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 14:17:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffff6, 0x4a02) 14:17:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4503}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MTU={0x8, 0x4, 0x1000}]}, 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000140)={'wg0\x00', r4}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x5, r6, 0x1, 0x40}, 0x14) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1000000000000, 0x4a02) 14:17:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$AUDIT_TTY_SET(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfe, {0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4011}, 0x20048800) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f0000000180)={&(0x7f00000000c0)=[0xb01, 0x2e, 0x7, 0xfffffff7], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0xfffffffd, 0xb0b0b0b0}) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0xffffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:16 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6b6b6b00000000, 0x4a02) 14:17:16 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x1) r1 = socket(0x2, 0x803, 0x103) close(r1) socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000100)={0x0, 'sit0\x00', {0x4}, 0xffff}) dup3(r1, r2, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=ANY=[@ANYRES32=r5, @ANYBLOB="09000002"], &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000180)={r5, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000140), 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="43e4007d", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x14, &(0x7f0000000000)={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x8, 0x4, 0x1, r6}, 0x10) 14:17:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:16 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100000000000000, 0x4a02) 14:17:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:16 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x200000000000000, 0x4a02) 14:17:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0xb0, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x0, 0xb, 0x1, 0x0, 0x1}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_SIZE={0x0, 0x17, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_PROBES={0x0, 0x15, 0x2}]}, @IPSET_ATTR_DATA={0x4c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xfffff801}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x20}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x7fff}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x80000001}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x8000}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x38}]}, @IPSET_ATTR_PROTOCOL={0x2, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x0, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL]}, 0xb0}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:17 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x300000000000000, 0x4a02) 14:17:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:17 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x400000000000000, 0x4a02) 14:17:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000040)) r2 = open(0x0, 0x0, 0xa4) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000080)) 14:17:17 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xf6ffffff00000000, 0x4a02) 14:17:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0xbaad) getsockopt$nfc_llcp(r2, 0x118, 0x1, &(0x7f0000000080)=""/143, 0x8f) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SIOCPNGETOBJECT(r1, 0x89e0, &(0x7f0000000040)=0x493e) 14:17:18 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xffffffff00000000, 0x4a02) 14:17:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x200, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0xfffffe01, 0x7, 0x4, 0x20, r5, 0x4, [], 0x0, r6, 0x4, 0x3, 0x1}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:18 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a4b) 14:17:18 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) close(0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r2, @ANYRES32=r3, @ANYRES32=0x0], &(0x7f0000a8a000)=0x3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000180)={r4, 0x3f, 0x2}, 0x8) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000100)) syz_open_dev$tty1(0xc, 0x4, 0x1) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x1c, 0x0, 0x0}) dup(0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EVIOCSABS3F(r6, 0x401845ff, &(0x7f0000000140)={0x9e8e, 0x10001, 0x8, 0xed53, 0xffffffe0, 0x7}) 14:17:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:18 executing program 3: r0 = socket$inet(0x2, 0x3, 0x33) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@uid={'uid', 0x3d, r1}}]}) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x7331, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="915643b0138674a544b1297ff94c942a04c941d2094d65258315686b2b8cca51de67f3cd9f12c3aca8c14500cdb36af9f77814a22c2e1eae573ba664d7fa0063d82332f854fe90ec94abd01ffb2a85dfb848c0019c7e7f69d629ca0d67df5d09bb95ee95cdd1f4af7a00cdba46eb96f5aa0f51c5955a01302f49822cae7c638580a9a8a63decf16ea49effe0b95e9c4e4cc8f8e6513e54f03f584ab3d3cc4bbd3598b8b59a12930096623f13220f418bde4be9eca004effcbb8fbe9673282648d9381502317c9f3c", 0xc8, 0x2}, {&(0x7f0000000180)="63ba6e9112e42cc0b2704497d11e65c28dd8a909f9aef937c2f814a08d4c1aff05a7f9815e4ad3af00295cdd918542b08c05cd0e8689e95288c2138668da", 0x3e, 0x4}, {&(0x7f00000001c0)="52486818bcd29a381e263e4dc8ce398dfa7f73485f3882c2327b845d1c6d25481649a77bc58756215b13e9a28267f8adc6fba1dfe7c0918a0f4a8765d932ab30e2f0fc05b13a597793763654bb409448d9fafd10bf6514eac6144601ac53f0352bc9161bf520f72bd7f2d4c0cc6b64a1de294bdd1a7756ff35a5bde9ac2315cd7afbbf21e328dd0f6a356872db2a4065ab48207b57dd9cd6961f8cf58fe58137ab91438d7debe38bf9ab8fb067baaf2d680947c37382ee2c10a37e76ce3c80531225a3e320d3cda81f7184c7d61879c12f2c1e8749125ee85b535d28a4c957c2ebd9f1", 0xe3, 0x8}], 0x4, &(0x7f0000000480)={[{@barrier_val={'barrier', 0x3d, 0x7}}, {@journal_async_commit='journal_async_commit'}, {@test_dummy_encryption='test_dummy_encryption'}, {@nombcache='nombcache'}], [{@fsuuid={'fsuuid', 0x3d, {[0x67, 0x33, 0x57, 0x62, 0x0, 0x39, 0x64, 0x66], 0x2d, [0x31, 0x62, 0x34, 0x33], 0x2d, [0x66, 0x30, 0x55, 0x66], 0x2d, [0x50, 0x37, 0x63, 0x65], 0x2d, [0x31, 0x63, 0x31, 0x36, 0x66, 0x62, 0x33, 0x30]}}}, {@smackfsdef={'smackfsdef'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x35, 0xe, 0x66, 0x5, 0x38, 0x32, 0x38], 0x2d, [0x66, 0x66, 0x64, 0x35], 0x2d, [0x33, 0x32, 0x37, 0x62], 0x2d, [0x32, 0x34, 0x36, 0x68], 0x2d, [0x37, 0x62, 0x38, 0x61, 0x30, 0x39, 0x35, 0x31]}}}, {@appraise='appraise'}, {@fowner_lt={'fowner<', r1}}]}) 14:17:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket(0x2, 0x803, 0xff) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x14, &(0x7f0000000000)={r5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x4, 0x6, 0x9, 0x4, r5}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r6, 0x4, 0x1}, 0xc) 14:17:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1426.787571] hfs: uid requires an argument [ 1426.818740] hfs: unable to parse mount options [ 1426.871228] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 14:17:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1426.937079] hfs: uid requires an argument [ 1426.941371] hfs: unable to parse mount options 14:17:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}, 0x1, 0x0, 0x0, 0x2000c004}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:19 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) socket$pptp(0x18, 0x1, 0x2) 14:17:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) 14:17:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x408242, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000080)={0xcf4e, 0x40, 0x1}) 14:17:19 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) dup2(r1, r0) 14:17:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:19 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10080, 0x4a02) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) move_pages(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000ff1000/0xd000)=nil], 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) 14:17:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000180)={0xffffffff, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000040)={0x15b, 0x16, 0x0}) 14:17:20 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockname$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) 14:17:20 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b61, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x401) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x20, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xffff, 0x69ba7a6b}, 0x80, 0x0, 0x5, 0x1, 0x2, 0x0, 0xdc}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x9) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:20 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) 14:17:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80100, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000100)={0x5}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x5c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x5c}}, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 14:17:21 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xa4) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x101041) 14:17:21 executing program 4: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000000c0)) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x40, 0x8000, 0x0}) r0 = open(0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) mq_open(&(0x7f0000000100)='wlan0mime_type:vboxnet1eth1lo-cpuset+em1\x00', 0xc2, 0x232, &(0x7f0000000140)={0x9, 0x6a}) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x10300, 0x9) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') openat$nvram(0xffffffffffffff9c, 0x0, 0x3059c1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000002c0)="d5a21826f088fe27c2068fdd350800549ff0d88c418e38a4b43c1c7aa2", 0x1d}, {&(0x7f0000000740)="64bb7f4bb066aaa8d6f79800e9dbb2cad151f3d3e4cbac23eadf116f8b683a50af31cff366d03cc4413e9b379520d03205b5cbbbda9d91de37cef81af048c8e508329f6b83d08036c554d59bd01a99b19c6e2adfc438a38fe1647dfcb0b69cff008db435eac5126a4b28913446cd7d45b2e358a775a6fb15b33a6c4b2e99c77cebdb", 0x82}, {&(0x7f0000000600)="9f8002903c3361ffcbff86115a7fafcf8048442df198549dd01a497d3c7ed3d6cb5e50fb4aaf2218da275d4cfe0252a2a0b78bbf67bbcd6b958fb299b9dd2f6c7833617c46b7f19da161e5003d2032d51c6e3f7de24522c141f6a1f6d4d3b734219423f3587e536f5be7e4baadb40ddb8e294e0b82a9bee54a931a98ea3d31d8c3df5e01977faabbd3524b211889d24c38cbff7d6d06c883a5dcaa467fa6846491dfb6152acf1299291ef46c7cc3314517a634c0557bf4bfe83878ad2e784033099cce4fb922465ce1adf7734bbf47035ed002b883ec31", 0xd7}, {&(0x7f0000000300)="068f9039bc08de82c3b42f1fbc03d05bf3f6efba017bf5f127635b", 0x1b}], 0x4}, 0x24000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95bfdb700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:17:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xb6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:21 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_LINK(r0, 0x40044160, &(0x7f0000000080)=0x400) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:21 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10040, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 14:17:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000040)={0x1f, 0x5d4, 0x6, 0x9, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000080)={r3}) 14:17:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) alarm(0x1) alarm(0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2b2140, 0x0) 14:17:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x1}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) flock(r1, 0x8) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x10000, 0x408800) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)=0x1ff) 14:17:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)={r6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={r6, 0x7fe, 0x3, 0x0, 0x6, 0x6, 0x787f, 0x0, {0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x0, 0x7, 0x6}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={r7, 0x5}, &(0x7f0000000240)=0x8) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r8) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r8, 0x0, 0x4ffe0, 0x0) 14:17:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x18b281, 0x0) sync_file_range(r0, 0x4, 0x0, 0xa) r1 = open(0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) r2 = gettid() prlimit64(r2, 0x6, &(0x7f0000000180)={0x101, 0x3}, 0x0) accept$nfc_llcp(r1, &(0x7f0000000000), &(0x7f0000000080)=0x60) 14:17:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0x3e) 14:17:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000480)={0x1, 0x1, 0x0, 0x2, 0x8b, &(0x7f0000000080)}) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x129d00, 0x0) ioctl$PIO_FONTX(r1, 0x4b49, &(0x7f0000000000)={0x8, 0x1000, 0x0}) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000005c0)=[@timestamp, @sack_perm, @mss={0x2, 0x4}, @window={0x3, 0x1, 0x8}, @window={0x3, 0xf7dc, 0xfff}, @window={0x3, 0x20, 0x1}, @timestamp], 0x7) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f00000004c0)="f8526ca2ac14c45a655baa90ee567e094afce2f1a679b132a5d1e8500d6ae93a8b3c550d2fa977d0ce58bc15c2035b4aae1cdecdcbe4d35952b7a518a830aecd3bd1ec7408c258f21a3f3a71530b1401488b427638986b168d2077398e228ab19d55322bd6247711d30a23c60f2fd3a9459cda8f71b7f7c73f3ddf83152dc806feb7ea76d6b1e32ffa7dc0057a4ad53b64cb98681e7a37115a8a419e03842fbbdffc6bae60c27f1490c00a917c7cab695648fc096151e26e8ae2bf6649ee1a7f0e3378c3130e0bd30a48f67060b1677fbd5236ff495e989f60d113dbf16d7bde1c0b2b6d1102653dea969e9e65e41f0e6a") 14:17:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:22 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x460000) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000100)={0x4, 0x100, "5f5f4e1999e6b75a23496779402eb5ce6bbfe79bd0724cd059b416a7d31cc8d3", 0x8, 0x5, 0x6, 0x3e58, 0x2}) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001340)=ANY=[@ANYBLOB="580e000030003dfa000000000000000000000000440e0100400e01000a00010070656469740000002c0e02800800058004000680200e040000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040006002cdca30c0569872a2f6f1991a09c862fb052d4db4aa698b79bba30bf8381c5252836225d558d2a34b4ca2effc1876a4e09ca38bbd6f9f5d15af58ddac347a608446b97adf961c1d5"], 0xe58}}, 0x0) fcntl$addseals(r0, 0x409, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendto$phonet(r2, &(0x7f0000000080)="00b8ab0a78c216992224531eb511563c52ebe12e3c05858bcadd3262cfad971faae97dcc5e783105cef71ef120a95630dde9674de43e0cb0a6dac43a208ea06c228c7771153a1ab95ae5e80f6eacca3ced17c0133680f4fa7e8d", 0x5a, 0x40884, &(0x7f0000000000)={0x23, 0x0, 0x28, 0x8}, 0x10) 14:17:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) 14:17:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000040)={0x0, 0x0, 0x0}) 14:17:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x45030000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x3, 0x45, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000180)=""/69}, &(0x7f0000000100)=0x78) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) recvfrom$netrom(r1, &(0x7f0000000040)=""/114, 0x72, 0x10123, 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:23 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$tun(r0, &(0x7f0000000280)={@void, @void, @ipv4=@gre={{0x5, 0x4, 0x2, 0x4, 0x2da, 0x65, 0x0, 0x8, 0x2f, 0x0, @empty, @broadcast}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x880b, 0xca, 0x2, [], "129f95c0a2fa83c01dafa6bccc6ee2ad2f5ce142ccbc3735c5e594399abf1ed480f22a09bbe16a61493d04005b23aaf46d9aa87ee9bb10bb9f2dbc3260e12e7e7c876e27d3ae467c7445806b156a33c3dec177f5779062e4b26e4ba0aa630811c790227602509ef77f975d4072144fb66995c6891bd233e1320b375e73268562dae64bcf600dadc3de224660df4f00ce2ba67be7ddfa72d73bfad71444e3ac129c04597205caf30f19ab666fae4138e1a0572f8a41a55fd4591cc3c1272ff907914e1d5dddcdb823f30c"}, {0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, [], "f59f126628f3c29c75c12319258e8a528686f79d737443a986289fc73a5cc8f5212fc3218a02bedd5c6a3b90"}, {0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x86dd, [0x40, 0x1], "8678673723996a9a8d5793c543fd224b29181ae4ad26c28551034071270f6ee8244db93fee0f9a3854ed5ef0932b6ba378aa6615d2d3d1f0aa5cc5129c28d1b4f509f443b1f3a8eb7205c1be733e472c242ab59b9b121782802140f70f0eff1d17b55526d1f103a166560c8c1eaa4f784441b99d68e68ec2b9b9a3786b4ca1a64e53393989b5ceaeddaedc0ab29f7c2891751c2a922300023d28d28112d24a5c805af781d75ec0027f83a56b623747372209f337b986bf2f6b7dceb5650b7c05502eb6bf8429631f96a540d46d40135cbe71abefc9b59a584c5b5235ade004a2b5dad03f9a0bf8efab"}, {0x8, 0x88be, 0x3, {{0x9, 0x1, 0x8, 0x0, 0x1, 0x0, 0x6, 0x5}, 0x1, {0x6}}}, {0x8, 0x22eb, 0x0, {{0x9, 0x2, 0x8, 0x2, 0x0, 0x3, 0x6, 0x1}, 0x2, {0x1, 0x5, 0x2, 0x17, 0x1, 0x0, 0x1, 0x1, 0x1}}}, {0x8, 0x6558, 0x0, "11368c90315e98b7edbb9c27d7e66c1467e4e45bd44224cf0dac2f2a631e44cbc99b6e683df97d583f13c4670d4b08786dc88aa3985f7d9ae6d0c83bdf230a76cab4b990cb3adef7cbf0c4122d82f26900e57c65e176cb5d1db634372281380cb0315b655df6aae924807fdc18b6307775e3d8ce46bfbb09936d8f805bd23f1c759f6f6415b26dda53c73af81e69de15ad9c787a0e25e4652dbb075dc61371"}}}}, 0x2da) r2 = open(0x0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fcntl$getflags(0xffffffffffffffff, 0x40a) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r0, &(0x7f00000006c0)={r1, r6, 0xe7}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000000)=0x8, &(0x7f0000000080)=0x4) 14:17:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) connect$x25(r1, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:23 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0xffff, 0x4) 14:17:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x5, 0x1, 0x801, 0x0, 0x0, {0x3, 0x0, 0x9}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x40040) 14:17:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:23 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x8) 14:17:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:24 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000)=0xfffffffa, 0x4) 14:17:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=ANY=[@ANYBLOB="580e000030003dfa000000000000000000000000440e0100400e01000a00010070656469740000002c0e02800800058004000680200e040000000000000000000000000000000000000000000c0000000000000082d60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000104000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0xe58}}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000080)=@v2={0x2, @aes256, 0x1, [], "0a432d9a35bd7f6e1f120c3eb9aa04d0"}) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040)) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x5}, 0x8) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40000, 0x0) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f0000000140)) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000000c0)=0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:24 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x44e03) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/vlan/vlan0\x00') r2 = syz_genetlink_get_family_id$batadv(0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x8800) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x4004000) 14:17:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$EVIOCGEFFECTS(r5, 0x80044584, &(0x7f00000000c0)=""/89) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) r6 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$UHID_CREATE(r6, &(0x7f0000000180)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000010c0)=""/4096, 0x1000, 0x8, 0x3, 0x1, 0x8000, 0x2}}, 0x120) 14:17:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1432.312341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:17:24 executing program 2: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000040)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) [ 1432.353367] Unknown ioctl -2144578518 14:17:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:24 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x9) [ 1432.412319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1432.476930] Unknown ioctl -2144578518 14:17:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x9effffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:24 executing program 2: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r2 = open(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='memory.current\x00', 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000740)={0x0, 0x73f6, 0x1, [], &(0x7f0000000700)=0x9a}) tkill(r4, 0x3c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f00000006c0)=r4, 0x12) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000640)) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000040)="ce8e88a04336125a9aa32619e682485e96025b13206da53a917d47471e3c9bb547b83a8392cbe53bd46867269471607f5dbf9bb91419643a8e2b22e0d3a29fdbd76dcf29cdfbd246311026d4383b25ac9c54e066f2980e974c0ca9b61fa44fd5f371c331ac8843fbe17b4ef10a48dea8fc03c4ca1a274ec73e8d0da6d23e9a36a7d422e06d201ee5bba1a18320122463baed0ebfbcef1c6f435f27d2b62cdd56d90179842a7136e66e5b06e97810c478835f740f7889ab875d5606801db772d0181519c7d84f1c52380bff4765f501ca3226e14ecd952c092cf9b98f40bd3d6e3afc9e8e6d031eb6a51d09a4", 0xec}, {&(0x7f0000000140)="6b3451a95ea1d2fffef371103ac6f09f88fe6c4603bef7ecb2b29cf455e655bbbcf7b74fd737b351db6d2e2c1c2e054d712501b2f259796f0dff5f83b68972c4f161a3d3711ab9894e794674f53554d8d5685596d5ad0c9909ebdf31930f831f31ff4ed9a17acc8a1d1530f58554f2fbafc30a681fe15aeac7a408b23316396dbbc75884610ab6902d53646175c14b93b9c7ff0317dd6ffc", 0x98}, {&(0x7f0000000200)="d9826b95cfaf7732eeb4bdd711ede0a3bbb5c299d27025d9fb754427b8535187f4cf3e709039651bed16862d15c7bd6720dc674079bb0197e99d440c8f1096c40ccb2cf106e8388a5d111b7588e3ca27f6560788bb2f772c36dda065432f8c83a0ad2b0428613bfbf22f87da328a70de60909f9b0dd38ddc9ba15cc4663910ad8f8710ff2a18795c8c0c1dbcbfb8c3875c0925219c84178ab03fd73cb7d5fbf28f5632321b0884d20eba57486413ddd65e9733c74a9ce2b5e563a4f7c98ee4a2a4730bc17d8a70ce3178b788ba3899fe70d4a2d96fedbf87ef", 0xd9}, {&(0x7f0000000300)="2625c03b49dc089d5092b21e1e888c86957b44eb50d070b1eeb47402dc172cf0f26495ba8bf6e721cbf07863b8173141a98a4ae1baad240b70a61c465bbcaf8f1d42fd0678f3f1e7456fc5063fed0e52bf055ffb3d13738d4684ab284c999fc928f6420b582b2546e875bec66203c492d3ce9ea46bde09c628adbd5a6bca323a5b44846cab17692cec751d86", 0x8c}, {&(0x7f00000003c0)="bcd5868fb35657da095a0262b47f1ca1bdc0a1e576c8d9a06313913302ec132a084cc490162dad3e83d0432d9323655b3a0ff8c4c3cfc2fe26eccfabf9d97dd50345e3cfb482cf1470a1550423607cbe76fe0a30e77bf72dcb327fee8c148735a4f6bcfff5dd6a64aa4a7cf6b6d2ef70a33b6dd58e5457295e9666a50f5e26d029689353ed5778e1550e769464117701fc9395dac8a2d94335a250574774f7d0b53e6baa0aafc04abff634460e386624cb4a956a7c75ca30433c70f5f6e8d58839ac3372f38ccce6ec9708792d", 0xcd}, {&(0x7f00000004c0)="f819640d112e534ce0490edd2f8a57502ff67b5ba4811976b8ffaf75c2de3f72c0b193a77826d773d876a0e0ac0e28a243273be740226eb03b9d114f18fc301b850f260e838394c8", 0x48}], 0x6) 14:17:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:24 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f00000000c0)={0xa, @capture={0x0, 0x0, {0x7fff, 0x2fc}, 0x26ac, 0x80}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x20401, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000002140)={{0x0, 0x0, 0x80}}) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) getpeername$l2tp(r4, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000002100)=0x10) 14:17:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000040)=0x2) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:25 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x84303) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000c, 0x810, r0, 0x6) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) ptrace$cont(0x9, r1, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000000)={0x40, 0x3ff, {r1}, {0xee01}, 0xfff, 0x3}) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x5, 0x8, 0x1, 0x98, 0x0, 0x7, 0x1002, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x9, 0x5}, 0x152c, 0x0, 0x0, 0x1, 0x1, 0x8, 0x5}, r3, 0xc, r4, 0xa) 14:17:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r3 = dup(0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004080)=[{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000100)="d56afb0e3fb66f94f9c178fade85be67355bb3815d70c825a096bb1cc70937175adf73bac1147aafe93ca057f99872655baf80aae62213e1b9490812571d4cb627767845a76d9e1f85a694c867fce411b39eeb4e87d23ae43d8e086d35c0ee7f94792cba679359f19c3390ec83c45182a0932df3eaf6ef4bc0ad4a", 0x7b}, {&(0x7f0000000000)="03e235581da80057411f392e05ec0035d96684d004e3003a3e968aeff3fcfdc11da56751a6e9b193ac86", 0x2a}, {&(0x7f0000000180)="4aab606478500d44c498a5e498d4a0c892f9cd47f8c4595c3bce7bb9ae530240e16088bb3bdef6729cd1ebe0f81284", 0x2f}, {&(0x7f00000001c0)="541c97669d9936272c693b97e33ebe9a2e280ec1e3802c9170da795770252775708621e5803528fe8040a1292cf4263a55f4b6d3bbcf4887f0939259020c56a51528473a3fa44566066dd3befe21ce90f2f231ee927c4e65d203232ee192798581b014201da6d0ca98d0fd19e97a93aa8fae852129a806401e0535ef79aa7660a1a13bc64946dca3c7f9c0ad674fb92ee552dfdb26ae002ae2ef7fa57504e469a1ff0ff70f6b91cf32bbfb47a4e42fc4d9cd68a5b5e6075d39695d71a4115c8f2b24e4afed78f1f0cc3dd5d517c034b79c0e9d145d7da36cc08c620e25a6", 0xde}, {&(0x7f00000002c0)="56f925968c864248091280e68d2b827df7586016c7dfac08a07ef02458afbad1acfdad216dd1a37f59260f86774bd915966a97e25ce245b74ae210c7b7dcd2a7893e57d32f7ed21e698c7a02b0aa04830eb5ef7fb58d7eb9d1351e18a68813db52f40350c5a04d98cd21a0e3e659f9f5a58fca90a8032a5fc12ac1df9bcdbffbacde4f0a4a75dca4b6525e8a9959d5bc0fd5017ffc9db729d9275921753e88400a84ef1d38e7bcb0b2fff7677388fb1f08d7977acba44d6bed9956688417c365fcacbe4fe17015a492d9bb45cdfd7cdc065bbe78b952b4e213744450b63c4d1090f5df1d", 0xe4}, {&(0x7f00000003c0)="fc59ee04066d7959733dd7839a3cffc32bb17a64dd85f5f5a61ca3164117e436c5b128969f112a0dd566f68d538a767c3293c9bfcb04065586602cb07dbfc737ed28daadf51158e5933830ceb1046e0ce215e4160283740cf6bbfebb3dcc0e76f23e1e4f4011623c361fd94c9c97c823b6b63d2c4295a9784b7cd30e4bba8408386725385ffa0711ce1731ea76ed968b2e90e0a64c4ac4ad158c0c2d63c6d02f939b590dff9d35fbe8096dc2cf37dbe6b71e0ec284b20ec95bdef45536a8fb1df7ca02534d48af937df6dd3fbf65bfd850430c0103be199e246643173bc031aaba3eab9878371409b597ea3e3a9e464218c7c0ba4dbf527f2df02778654984ea85df2d5ebfe360cbfc96b21e87243cac7b324868af7ccd1afbaf0420ca77dfc6bdeb5ee2b397b3da4785f8c9c44142c72544569e9a837acb0ce45e05f9e559a8382ddb6da4fbc9e022ef06e297851d01a04b9a7fbe52a0840978e71d46a2f53a49b7eafcd6373b111b94cf5b39e038ce02544d43f68995479330456fd822da102cc93624ba6d18276fa3dcead52b678da9b75849900fb4d8bdccc45258479016e555a0661e9723d9448023ee8a460c887a76ac20c5dc70dc84276140f14e09f94f449810722eb791d810cd740ac427b4ee2de91bfad65b8be571f92e0560b357a672e3f0e75cb70f44b431d3bf3fea916ce4008b3345f710b594e6f488b07aeaf96b264b53a6940f8f02f1a7750200adc3ad384fd3fd6ba1d68086cf566fe1ec5f7a29afdb3878ed23d2467fec6ec44bb45741c767ca5b18d6f44447ab3556e759ff009c6b98ff56d268a3d7bf4b9a3bbcac722b24e148da7018ce23dd25fb195a8f4fa0ec38ab13c1e0fc8259466620ebc41bc881cb2ce12dbfaa10721e16fe802beaec5420966aad89bd99fa4f9f0ca4f6890228c1c29f879c545aaa9c6255b584644d5be8f44811ed9b7557c654722bc96ba3ea92a41a94423c61bb98bcfec698c5ec322818a7fc5d73fdd8b971c0b08d71daa61ca6020dab1f182f8ecd5f1c1465491502e72aa2165c6f1b9cece1e786182f3aab0acc9b50e2959a8f6f7e2dc6f200296840df192256b62b63973209072eabfd616ff0ed8458284f711ff878c60086978391e997b4c046351647312f6b7b2d6df5d69d5466e9813f1d197e8960efb9ff7bd310b0c1327fe5f1776faf1ab94d5bbe172d47fae1092043351f1ae90b310e85ac44702237564819d1764ba2f7fe1dba52a6c2c601c6fa390d230b4aa7ce5f35a6746725896f52b4e53c43d7c9856fcfeca34f0c8fb77e53f8d73a7f642efdf1a1e58e8d7eebe0c79d03a04f03239ffb6dfdc1f90ae2184c019d2916c642da25a3c0ae649d7541f367bf5313dcbb75c76facd742cd4c20b2ca9e89e7b12b47bf4316a6ea95f444961b7617745ef558cadba4f66769b5b7acb2d13688ed37c75d844e4dbf3f6cdba617eaf4d9e7b8dc9945c5067b634804355de676a118a1dab4f34701bbf862ec77260e2561e1fb5cf20f775a91e3c5a6e96deea3135b628925041a51853aa9c12aaf86638aeb22fef78c89a596b6bb2f60dc71dad5650cf4f0cda72f39a1560c21f1f9cc5338df2f7a2683c5f6f28ec52a0630f07552d33695a776790845ed34bf84c17a4d120e99ba4e7c68ac6d34a4a89c3f3b4373351d6f26bf0bf2e34f02188eb484acaa880f45cb12fd5cb15c10dce0f893eff0f05b4a0e2fdebd7b64287e6ced6245de470e0707d17f5875109357f1e8ea3e0030dc0b311d3595dbc79bbfbf6e9412e9d9ed0a5fcab2fa453f91a7ebd1fb7bc2b9de4c13ec9192dcc07b0b1fdd9ba22bd7c96c7818908920fa0598a5de82bac51ae0f54141237a793b0175f50d74e77bbfbd81b701f320d427f1bad742228baaf7fd441cb18eb700fe6192ca5574bc43950e94f2a06a341ad43930a8dc4c568a158b3fd6a5acfb4ce11fc792e5780981636e64e0bb2b8762f1c82c1a69c0cddacf62c063bd37853c28a40d5b359c6ca2c0c80d32fbdd628a840b4e3e0e216906118a6dcbfe3e9b2c53261c184b59f491cff3359c6db9ecfc04933738a99e8fdeb80dbc893c3535b2fa75e1522c9b8bee0daaaef1d1f5e083769e35a2783709143e7db47c6ff609c8c7c5799434bfb4c36fffc9af8129c44c5a1b9397faeef840e6cb8ef0ed5831e525072faa8c20fe9f61b44b4ad4e59c74f50c7da949f461e506fd6d2c267d2efe62ed6c58f8f25f763ae14fa11983f1c699eecc137ef42613c37f00975eeb891518be0d30eeb7808103c1d8e91318f76cb8ab146401dd61f30af392e23f5fa9a0f67a511a9db6340e66afd105dd210f4350167dae098791aa5b1862ace27623ea4f68ee3a3fcaa1c837c27238be4e1a4be31112fbff49f7cf2be6cc278481170b4baebbd4a1980d8c050816f67094f4575cb3028df221bf0185bfc0dccba65a430826843104fdd76e0e32343f4f3328c378247b1243a1ee5e25a252256ad93bceb83522f71cc54a18adf9cb31e51c643d6d6f61b9cf7733e9e1de2588ba730d144f72aa481ba698804f2b97a1ee4a0a8df601e8273d7c10eefbacc37a299261019c74796a0c8ed2a9f30e053eac7ff23e92badf544337f28f5246136dd6af5fb96159ae3ba791de0000cedecb4a5830c9a7bfaadf2b6a7a395f50d4c47ba5f5b7e8c4caf100a40939bd776bab73c880a4a68f1f2f9d577b4eee5cf01228579a4b45c60c8b22f1025067ddcf639f024a4bdc0940315dcb7598c67bde23c6754f19ad75dc6770bc8c8dddbfd86c92b89ceb457b579721f823231845dfbca26ce0d6772346e806fca22370e99f7c0753084c0b3440edf1d2d7a7d1cf96f277d57050678680b1aeb043af2732d54e02cc64c0da0773301986cc5ba21bc5c96f8048b7638988ac13c40802dc167b9341a77012a787ab53e7ab85518e0cb5d4d723fd0403d75414c3c96a1e99aa9d94700a16d79fd216f2a215a21126a78a7535b547b9040c4e1314f7fa628f1cf595969bfcb9d4f5f0a829a0d2c4cb8fbecc247b3e56d0d66936002a09dbeeab9aa9aa171aebc4656d13e562890f362ba39228a1c7e29112e71822fccdb6303efd0a961a1d343a12d98b804804c6cf68752d4e2818620ae9392ee9dd4c785a9e64f23cbde108c5c1dade45d2b0968170a217cc3c5992669696f44e550689d2e94bbdddb2b031edf4d1506f97a6fe3bd29581f22b3e57b5f96f80b8939b0e6a430754409221536279827ffba57f6f95f3595ad01ad8af6f95db15c92613d264b812365e64d8a46b66177bcdd2c58ec19df2473a9ceb78382bb8af51bf199484c34b0407ffe676287fea98b6b1278fc0eccf076eabd8cf0dc2c933b8ec2d500af2d96f919af3b42965c51d8b47e1db41b5a5b008a4af4b2c7f3e0c4fc22121ef6331ac162e093458b8fea7b211190588b126c43b0b19b65f3ecf79a2b80b7c1d3c6a50111ae05a9d71672a4f158c20fc44abd4b9f6d37f8ee84d811c5e480594ae34bf867ff1bf21b4c965986317acc82e63df983275c9cc8fb3da824e0b6d0ded1c15df4de0ff2286c6334bc9a4f5e5c3fc741578fef5f7f980f34172e80ddb0b3535843c771a60f52bcc4b2d2c61894867cdc990accec93ee1f23c87335d2f6d60eb126c061d2bc62dfc0dec4a2b184375b5a23f3a4fc7b24f1d7770f536776119fa9a43e9f6ac7819a9822866eb631ab5c3da77504dfca8319848fa604ec1963ad2d4d26bb2d681f3e2ba8448d06cd0bb48f0da51573eb112d8e2944abef2bc48e65878b657d2d7d326b7d414b02da53708cf14320c0cadcdc1701d2fb3af254596ce52e3b9897630728f44c93224a8b19f0658d4e466eb857c224a781b3cf2d9426fb5afa8757e907722ee221494537a593bc4d6c2958beac990a23f055863d70df7b21d392e3aa3993c0c5e4298b17f45b7a72f7212099ee830187fd534e3cd938e32ad3807d184003c4539b8765138845e9c9f81049a2314a998a58600ee3ba48aaa987190a31d27c4ec1eb4cdd2842d286cff6cb4c1ba7b5214761c1563015367527027449802beb51d6e30080de20c25d89a9ef01bf9d13d1d36d12f6a6ef655fbcab2c77e282c3ec76af5421bf00aecad81da47b196bd09cd57ac897e061aadc87ebdbe552ce0aba8230b5be404828343f1ee828b8724e5d169997379aa3e07b58a5a8cf645847398adef9f7f2db342a621f17c52a9e85ebd95d424fd17423afa0dfd4a2c0911c30425b9d0e1a2e2e61f00dc27b38adf3a43101277c500918744f82f7b94339ddaaaa7c7b67e27131911697c77feb4455247887b7e020290609801cce37a34edfebc387c19e0b7868962b23b205552a15e844ace66ab10bf044f5cc135cd00bc77c1446eb463cdd3d600746401447d9f76d0592ca1eae8647a086b21f37af50644f70a5ce011d716cb65486821c48c43319d2b4a3b3e4367489cf3fb931be845fe697ec0199737388602c994f1a97064b471249a62a3070376f2cbada075aea4a953f96ff0fe33a959e718466f0d72a350a0de9b6c75de9ec56c3a9e679b34094c4cbcccb3283c84b657038603bd8e8d7ed3e66f86da510285ad59f8726f35636da68d01a5e046081c8b514baf5d05eba50ec2187619c8fb5b9d77d3b3fad941b44ef33eb7aecdcfa5ba5105dc4855a4bb095d56edfc15f665fdcbf2f2a870438a1c7aad232fa209e9347d68b868f6573776d7756ef322273c390a27bab0cc748f8098df21e0044c83da12f24d2096915eb6c79dd18c71c585f339a39ea5ddb9acd412f2de212f9f0baa7a7e2b9163251fc4cc3e3faea56649789e5039a5c4c8896a55a19b74c2a104e81ef796b73092dda4ef7fae553bc2e31f745a370ed03550d226f26ce6d02f6f765f7f6e5bf001b820700fd3f1519bfbca0f5dde71cc28c0bed1e7a84f810477600b2aba616d7227821dec36221e927f810acb052be9cc54e9c9298b76e43db00788a1aa082d3f31c4531680abfaf3d09b490fa1db3db093c9191efc7a9c4c3e4c8cf95e3a1ebe121de766b762edd5853014ddfb21cdc83c69f9fdd51baf579d87ee47459c90cf0120f09eab3b72dc03f732c795c179b95b5d30a85611d509473d1531da459007b89f9210a521728b917c098d8681be703b057e7e1cf9a08bd6ee70b1a253ea2f01355091f5e0b18f370d775df8607f61e15840e51ff7342ec8fbb4bea68c46234cd439bb4dac33c6f160aa53c49773a7532212a4e27c2812c35783759eb4ae4606aaffc8dd544a4a37da9752f9636235f8c37c5121ab071d01443230216ab4fdc5ec090d25ecb7caa16a5c9f46a2a66cdba54237846e5aa5954915fb7476909e3e79832bcc92795b307bb4291658acd6922b344315b35453dae9e1b81d147f8d5172648694db1961b878eaf39593446a0bcfea9b8ff4e6a32d89b6189a89ae4b9c23d87fd7271e3505f67f60b77a00fd758f22967ef1438f685542e1259aad1fc81e75a6c11e0c30a7be10c82cb4874555abde4abf72f11745e281e5d5dc257a7a995c6b7a31ef0688a2e063591296754b7be274c197ea9bc4b4752fc5eeb7b7d8b9cdafd9421e7168d2236e6f7301d6a3e5b35a9c51f8b7a10352f7745a28d25e1abfe4315441ad05fdfb221a7c6e5a1b199cdde90cf456f4b259c3e45c8981f9c501bcffc61151959f956bd5e6323e681b8da582e78dbbb2bf61f35676348310cb25f18cbf313dc409a44c0944abe070656cf0129cc1e9d290fb2384075a65f7033a0835664f501dea46bf29e93c3f4c", 0x1000}, {&(0x7f00000013c0)="d615e091c2c4a3a45402056bed", 0xd}, {&(0x7f0000001400)="beae8766243754bc4484560235654d63f6bc64ce3c8d972969e4b931c2c8a6a2", 0x20}, {&(0x7f0000001440)="142ab165e3bd624a41e8e13c72205d6a4b7d33b76f034a739a633d1296adac4877475ac07d06a2a462e3739632862a888c8d77e925ffeae298953c1a8db03474ed92f67c0af13fa81314086123c0ae4c65ae7d04fdb3007ab97636f5587c0edd8934aa90d87832cb64d7dc98dbddd1e0189c76ae9d7505ab708f6baa92be9a9c2b636b0f512363be6ad93aab21b334f5da4c4a5e3bf71c097f12a1d7db51b6ae7e1b5c13268aca1e87a6236f086db4d1f495487f4201b88bb28b6f2d49455de6f9c369e3f487e73c532873545bb33d8450954f1a682adee7022b56307ef98de082fb1f63", 0xe4}], 0x9, &(0x7f0000001800)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x70, 0x4000880}, {&(0x7f0000001880)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001940)=[{&(0x7f0000001900)}], 0x1, &(0x7f0000001ac0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58, 0x3}, {&(0x7f0000001b40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001e80)=[{&(0x7f0000001bc0)="d04e1d9bad7f9aeb5e1dafa8ad8775fd67c02e24de237cdbfaecdae10b7e657a2d5aa58cda9431dd649aa3be22d9e833201f79f25db5e1dfbaf73127a91ad227fcd9714c21f88c0264c16d11d74b46f688fbe279d4b6c6167ac7cd1e0a3832b434f5569a4ae131d6d2b9f46499e8143569c291f56a2140d6b111298e75d9", 0x7e}, {&(0x7f0000001c40)="e7bb32f4944b9c2fe467867c53a80a19713b78ace3e7f7bd25cf7a1a939e666144bf94876d4f32a15364b625b62888f3724df930ff6fe5b3851e9a140c6de53b684e3e30c7d25e5c569db65a0df7bfe29c1081c72428becc340b49b9589d7fc54c832468ad3101b26c88e9578447c832edff18", 0x73}, {&(0x7f0000001cc0)="d3e197417ac660050dbd64dc9442bf6965fc7f336226a528c46d9a8694f0af481d51d31cdb5338f10acab58ec5084b85e3f8e2b899940dfd365ac865f0d982cddde8e13b8767ad9bc25bbe5f8bb7eb03e2d49243e571b7e14285cbc580650301dba6d9272cf258074d0587e834a2126dfa84a136aee973f6fd745a28731627c178c53b7c032415dec33dd21d313b553bb0de16646903c67e3faffdca092b617bd6", 0xa1}, {&(0x7f0000001d80)="69585e21e3d8dcab0aac6f6b77d565b90ebb40c14fd44f47da4aa238cb0be77110f77cae86b4538061994e64c17118601a18dee655d0e0e95bac704beaf5e77c1554baf9e601e6477284f073cce9724b1ee6869f182bd816d10e7d9a8d6067d028cf58c0491f95b57a65532888cbb66598cc073a7cea0be43d183b091fe6a26c5b0708c1ccc9b59e7d3976811c645c84020d1fd13678200073f115a927463e0e24cb8bc788f14cfa67919522eaeea230f8b123b7519921872b4ed43154cdd8820074d335b291a26772ff", 0xca}], 0x4, &(0x7f0000001ec0)=[@cred={{0x1c}}], 0x20, 0x40000}, {&(0x7f0000001f00)=@abs={0xee18d34a7ea8377f, 0x0, 0x4e22}, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="fc725a4568361af3dbd4ca3efdc9d6e94ba1fae0d8799c79048ba42bf9774699592d9c40c435666bd6ccce13eaa0eaaa0e694acc9b47b170fed5b286c9f1a748c08acac2cfc09c079f3b54554f694e40868f15f27edb34095b65f1cc578cb29d40bacc91d7faf73ea7d491e9a6bcc344888a0117ef1a951643087062b1044ed7e55579c2f0429ade2b6bdc9e73fb62968aebf99fed3167d622efd028c99bf479bef91a0d7f4bd76e571c605987f02c71971031e34f40f6dab80713a8f2cafe8ba1f3cae55e593493004dd518724bdc5f62a15950", 0xd4}, {&(0x7f0000003080)="c4333a67a1d69c2e0e09bb47306810c66dd3d1dd815d6c797bc2", 0x1a}], 0x3, &(0x7f0000003240)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0xb0, 0x8881}, {&(0x7f0000003300)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000035c0)=[{&(0x7f0000003380)="09e94896fd1273d2faf8fd9de65f1e7c2aa13961825a324606435cceb2320eb1dfdaafc24c0c131d05702731b7283a19015e2724e591cedefed9510304", 0x3d}, {&(0x7f00000033c0)="f933008e6a73307014cc7373f414a7bcd53fe0645583bf7600157f0f99c37b29f1188bfd3768ee9929915cf471fa7f", 0x2f}, {&(0x7f0000003400)="3071da05a6133a6747f560cf86db2592be93d2362f2cdc395812fc1c46c3899ad24994bcd5d8962fd62d6966f82585421d155126cbf156e9d9701a24b1db33be4cac579586b845b3487bafe8c68fa6439c896b717b262a3e329cb68be37917bfdfb8f64b9ec03d3ae26a6705f909b5da33e3dcfb4e372366054c32319b4a95ab9ffcba", 0x83}, {&(0x7f00000034c0)="6b8ca7d2674414f5082d99d6c633b9f7031e46728130a8d987668eee264a99332fdf967fbada39352fc628c1e562a5107d396938cc131d41", 0x38}, {&(0x7f0000003500)="84de81d4847aa479c269932479d0d9b54dfc3c3f3d98f7a94bec7409090a8c65d4f682e38d7f68436249eb59f3d2e059c9f6d0b4d15b069cc73d993e3ea2837068b5bf51413a41a865200a4e8ddfa7a2e4152be95d98263edac9df51dad51fbcbee0b31a2739db96280bf2b8af3d45752170687ee7723ca57b7cc38b93daa1b71500cda6d8692657268d25e98a7e7764ff7231fa", 0x94}], 0x5, &(0x7f0000003640)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x38, 0x20000040}, {&(0x7f0000003680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003c00)=[{&(0x7f0000003700)="2ebee90a63e187078c3a65d6c16ae0038fe98c8f8a99fb017bb9c84c760186f67aafced31e82e76cd67ba5e7e1226af076ecc18b959fe03323d2737cbce458cfc9f3c29f8e443c5bd1303f4b3c1245604078093383bd45bd84fe127b02064e194b6b8cee7ec011cc3bfbec7b23c6c5b415d7ebe3eeee2c15d6c9e0992f2fff615e886e0e4af304f24e881220430d18648b2978f805cea6c1d8e0d6a1756c5548e6289ab19e1b7c1f7db003aa6334f661017ab7dd266d04f24919f56190dc856967510c4c7a57fd732d73e9755a026e68ed5fbea803a6d67f205a891863e2cf10424603e0ff924159b7e87c78d53df142d6bb1ddf83ddce12", 0xf8}, {&(0x7f0000003800)="1dd83a2493f0665c2155f9f1955a0ab5bc8d57da78a4e52bae1dd48e2363d5e11058aa583d86835d162a641f8b66326cb76308eb657ec917cc923e48e633ffe01449255ac29f66d5a39d63b53ac4f9eddc9b6ece39ceb76dd9bea28b2e8d5d675a12528cdd88e16c3dd859e23c4a6d8ba8854381263900b17bbd13544941c8c472ad04371ea53732ba46977c7328d0ec6a499ca9300e01752de0e0232a5fc998f86781d4b5ebed5e32fd82618f547cbd53b09ac6ee97bde80b96b415058173f9e5551419eb652229ba6db8762dc543f2b091e3bbcc8ef617d80bbd6e48e806bb5d56bbf5da3db502588be3e64718a00c0c737c6f", 0xf4}, {&(0x7f0000003900)="b373be875de981f96e7f99a902536a39e14a2952e49df90832503ea46f137d3924107ae092e124ca49b05c0186569fc7557f08cc5f1f6173b67124e5772015cd31a09f9b3e5c24abc94454240635ed2bfe7ca77d0dddf60336e7681dc420e20295d25a2116bbab5660e5072e66fdf7b8c1d1ba46aa1768f33329c5f2561cc71471f7d6d45b5ef513ba01aa0b39fcd608d4d0fea47f2bc4e6b0a59517f5ae0b67c2c75926cb9f469b4da94ea26c7323d1a003721c3bf55a9e15d50aade2142ef420e1f0423fe58e66f7c059ffb4125923ab67cba8", 0xd4}, {&(0x7f0000003a00)='n', 0x1}, {&(0x7f0000003a40)="1ac82fc3510517a89acd4df7a6dc21df90441955fd0462cc0fb0bdd0fa27ff6b6e208104b6ad072631a5bf28ef428178c9c55645a086528f3ba6db9985a4d1b3900b03ce221707b82e442eb6ee6ac32cc40ed76589859e687853bf540d40a4b3ca6973b55e6f5926df4b7f7aeb8b1a54f4f5b96618ae3133e0f4f544a1239e824566ddf00b0b825a768fd250ea210f218cb1b4863e24eacb4cb771c56113ed3de2a60be22366dea649690e", 0xab}, {&(0x7f0000003b00)="8cd31e", 0x3}, {&(0x7f0000003b40)="242a9b5bf660c19062cb1e099570b7c5eed4660e478bb22aa5fbf9cbf0da9414e10a5f2a0f6190993478e8181ddb3b2a91aa5ea6fe4ac952c2f92727978a6af69b32f93ad37e8953190e7d03db25ed130b9f687a20f1c21ac6e19c21e3396e66f50c4caf240ef61de41126be89c0521aca2be442f03a108669f28e813f240b6e62e8aa8987c1f93be642f31c3fb75c132dab1d07a540274f936af9e6cd7b7025", 0xa0}], 0x7, &(0x7f0000003c80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18, 0x20000080}, {&(0x7f0000003cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003e80)=[{&(0x7f0000003d40)="10fcd4c433b7a5d17b22aa261ca8c6347919ba118b1059f6e3fb87ea4ad59416557ae8fd43995f42600d1f400e31f101489a49d2c12257a23788bc42cb3a387d7fd50277ac75ed43eb3c127a7170816c41c2710a6c4028be75d2c67618d8b73e5fc742445abb05ffc4048654714e1b8e3269c5dffe976b0ee733", 0x7a}, {&(0x7f0000003dc0)="0986f82d12074ddfe6ac839405eae1bba927957daac1d3290cc37eb57a44e35cdb3621c6d53747896c579213b930c7496f469a46be527c3b483702d330096c25ccae4c5104b32655d549848607536d6b8724ff2373175dd569d3309ec4d3dad29b05aa824d04a6898c9c38fe8198360a1a7eb9b8148b72f72280de3040c66ff17682ce9a12e954f8ab1a9e0693e190e1e9f9b9c0659db0a006727949a171e73ca20dc6675de681b09b", 0xa9}], 0x2, &(0x7f0000003f80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r0, r1, r0, r2, r3, r4, r0, r5]}}, @rights={{0x24, 0x1, 0x1, [r0, r6, r7, r8, r9]}}], 0xf0, 0x4000010}], 0x7, 0x0) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0x3, 0xb, 0x0}) 14:17:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:25 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) r2 = socket(0x2, 0x803, 0xff) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x14, &(0x7f0000000000)={r5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000080)={r5, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000140)=0x84) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x2, 0x3, 0x0}) 14:17:25 executing program 2: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:25 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = socket$inet(0x2, 0x3, 0x33) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@uid={'uid', 0x3d, r1}}]}) r2 = getegid() syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='discard=0x0000000000000009,gid=', @ANYRESHEX=r2, @ANYBLOB=',resize']) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='discard=0x0000000000000009,gid=', @ANYRESHEX=r4, @ANYBLOB=',resize']) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x0, r1, r2, r3, r4, 0x41, 0xe89}, 0x9, 0xfea, 0x8, 0x8, r5, r6, 0xd0}) 14:17:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1433.520885] hfs: uid requires an argument [ 1433.539990] hfs: unable to parse mount options 14:17:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x40) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) mknodat(r3, &(0x7f00000000c0)='.\x00', 0x1000, 0x7fffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000080)=0x7, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000040)={0x5, 0xed, 0x1000, 0x4, 0x800}) [ 1433.628788] JFS: Cannot determine volume size 14:17:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1433.699790] JFS: Cannot determine volume size 14:17:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bridge_slave_0\x00', @ifru_map={0x8, 0x8, 0x6, 0x1f, 0xfb, 0x2}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"/357], 0x68}}, 0x0) close(r4) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') pwritev(r5, &(0x7f0000000200)=[{&(0x7f0000000580)="53280578123a63187ed6b353441c698ab78ff1448ca1a79172525cda0b7d980b57c33a44417b65629ca8e2b63344942913e45ca05ad62a5d833d0c7682af7f3d7d6c413b73b32c", 0x47}, {&(0x7f0000000040)='+', 0x1}], 0x2, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000007c0)=@ipv6_newroute={0x21c, 0x18, 0x300, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x80, 0x7, 0xff, 0x4, 0xfe, 0x7}, [@RTA_OIF={0x8}, @RTA_MARK={0x8, 0x10, 0xcf}, @RTA_EXPIRES={0x8, 0x17, 0x3fc}, @RTA_ENCAP={0x19c, 0x16, 0x0, 0x1, @nested={0x196, 0x36, 0x0, 0x1, [@generic="285b2b436bc764560ea1d93003a543eda7976f5b31779b382931204eedc07f10c5aa2c246cad31c435990ba60f3f73e4e785904d51fd157dee", @typed={0x14, 0x9, 0x0, 0x0, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @generic="4267615a4397f593a807e7540b39125d2541a554451dc19872f4c4acbd9348f96ecd94cf8095c267860cc8d76bea636346063196e98da13bfcb893c761289200abd297d15e8878c1fcfd99fab83879257c9fda24b292b3fa450248dc090b6e679d2db6d74d3927d658c38284", @typed={0x4, 0x8e}, @generic="fde453caf6e1294a14a15ff259cc63c5f8cfc177bf4a0458aee6c1e14fc12912bba5de23cbb90a3ae0b93ce2765fa9f5591ee545749a653ca4ef27c2060c87a665c7ef3b0016eaeffa147c483c86fa904b97e4c059f6b144db3f83f2e6e43c0774f347a64673a44e0455b4170726367c30ccf04742de76b1da971fed1f2fa665f189a87e86c6d1c9f9226cb4499862001564bc617f8b4bde36cf25665752c42741df33fb7f18d89b7afaa5b146b981f7181f25f2f1acd9ba5696c9598d7bbbf6ba563c01ec93eacd68f1a539285efa390dca1ebd8c"]}}, @RTA_METRICS={0x1e, 0x8, 0x0, 0x1, "0600f020a16a4e0b538e5e55ad0bdffcf4db8b3bea3f9c81552e"}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @typed={0x8, 0x52, 0x0, 0x0, @pid}}, @RTA_EXPIRES={0x8, 0x17, 0x6}, @RTA_UID={0x8}, @RTA_PRIORITY={0x8, 0x6, 0x1}, @RTA_ENCAP={0x8, 0x16, 0x0, 0x1, @nested={0x4}}]}, 0x21c}, 0x1, 0x0, 0x0, 0x10}, 0x100) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xf5beedf4cd90ea9a}, 0xffffffffffffff76, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[@ANYRES32], 0x1}, 0x1, 0x0, 0x0, 0x4000880}, 0x4004800) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB='Y', @ANYRES16=r7, @ANYBLOB="0004a8bd7000ffdbdf250400010026100000dcb209900469613f9a9d3d7a599543aafbba0539be5881c2144888b033e3ab909b6ab13b6e4b2425c81a9a10b0e73d10934f87cf3c0c36e308437f9618e769f1e235d1c7353843234660c3cf3ebeee6a6d9e4a02dc418cd9c5acf37021efb1f74a7dbd9756ea8f34ebb5b4a0c3f03fa8faedf884328041368455a8b32a0afcdb28d589f08ca27661f4941171f83ff9d0e65f1e781e61d25c9cee075469e1b26cf8b40aa7ef32f08b5efe604b30c3505178a064b73456209a19c5f0ce4fe0c28356c00dbd7847f7e5d8a8708594657e7debe532832ba48e6e5298eaa259aa5b3f9e7d1f06fab90c2ecb8047871cb0e4947207376a0b382d7923f19f256ca9f849cc"], 0x3}, 0x1, 0x0, 0x0, 0xd0}, 0x48005) sendmsg$NLBL_MGMT_C_LISTALL(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8609}, 0xc, &(0x7f0000000a00)={&(0x7f00000000c0)={0x44, 0x0, 0x200, 0x70bd27, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x5, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x13, 0x1, 'bridge_slave_0\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x4004) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r7, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @rand_addr=0x8}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000000}, 0x11) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x82, 0x0}) clone(0xcd900100, &(0x7f0000000040)="b0dc92afbb9d77f3fbf052c1545985e9b85589cf93525927b80b8dea4118d0b21b68bcbdcad0fb871a3f69602b91a5f335f28ed12ce796b2faf6e925f3811df240e5187ffd63f32027403ca0c46c1e7e3e08612a46447c9aa56dfd9280f651091a478ca18b91f0acec45f7fc68ab9db11277cf2d9c540e127e96d22aa960331b10cf0d0f48e6051ec51de60dfc98ec33bec6de6c5d3e32b99bd8053cf3431300a8b0b0542f083c9bac50b954d86ebcb6785f5a159ebf868129399f2f712e", &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000180)="8cd962bc46b53fd51a78ce31197033483ffee60f358cca61d11c378e538d19e7ab3618ff24a9e380db17c8319b0088d165f5c115c6de6030a5c64b324d0f921cd63552180b000000000000212c88953aceb8034df96b71ea2138a3e944a5d402ba35e93fc7d165b88bd19c83b724b170d24fb758cd89f9cc6d3c39c994d9be3007cad6c5b9da9a97be7620abcb77586c6034fb495c568a5fdc014792437754a1059462e6b248caf948594078089946") 14:17:25 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8080, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x100, 0x15, 0x2, 0x70bd28, 0x25dfdbfc, {0x29, 0x1}, [@INET_DIAG_REQ_BYTECODE={0x3c, 0x1, "2849d1f4edd6bd726cbfb68324359259d9888f8049b8fbbf0dd7ddd5e450c0c833afc2a870d6a7fe0aa1c9cc3a74f9c016846b1f4c2faf53"}, @INET_DIAG_REQ_BYTECODE={0xaf, 0x1, "8f131105f75f05b100d7988ef97e0bd3beda0e48603a14d6987e4e15d626eea67e5b7f9db5b7a55273f5a8fec015915c9ac1f97c70b069cde42de74defd3d6233c122b906070d819dbc303d8a60c76c6eb7b4ace575bbd8b12b8bf6e3ec727bbd717429b02157b4092641771d034df86081137bc93fa0f77c6cf7efaece2bbfca04e35efdcaf885e6871b4e3a574e39e057027342273cf3998f1918e826b493b655392c37baf6bf663b18d"}]}, 0x100}, 0x1, 0x0, 0x0, 0x45}, 0x20004000) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xe0, 0x0, 0x1, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@CTA_HELP={0x10, 0x5, 0x0, 0x1, {0xa, 0x1, 'Q.931\x00'}}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x1}, @CTA_NAT_DST={0x60, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @local}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @local}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_NAT_SRC={0xc, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_TUPLE_MASTER={0x38, 0xe, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xff}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x40}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20040000}, 0x1) 14:17:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x80000000, 0xeeb, 0x80000000, 0x0, 0x1b, "e4a13646a0cff72efd8f5a28c44c9d9fe854e4"}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6800000002060100000000000000000000000000120003006247976d61703a69702c6d616300000005000400000000000900020073797a30000000001c313f49ca239a82fd000140000000000c000180080001401000000005000500020000000500010016e6b257529006000000"], 0x68}}, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x2000, &(0x7f0000000240)='vboxnet0.ppp0\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x80) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1434.017957] IPVS: ftp: loaded support on port[0] = 21 14:17:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:26 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) delete_module(&(0x7f0000000080)='/dev/usbmon#\x00', 0x200) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000000)) 14:17:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:26 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1, 0x3, 0x81, 0x2, r4}) 14:17:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xb600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000080)={[], 0x7ff, 0xd, 0x81, 0x0, 0x9, 0x100000, 0x0, [], 0x8}) 14:17:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:26 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0xca02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x140a, 0x20, 0x70bd28, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x8804) 14:17:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:26 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x408a02, 0x0) openat$cgroup_procs(r6, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:17:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:26 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x4a02) 14:17:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x9, 0x6, 0x5, 0x0, 0x0, {0x6, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x10) 14:17:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0x0, 0x1c, 0x0}) 14:17:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000040)={0x0, 0x1, [0x2, 0x9b8, 0x3da, 0x8, 0x2], 0xffc0}) 14:17:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x64, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x9}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x64}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$EVIOCSABS0(r5, 0x401845c0, &(0x7f00000000c0)={0xc21, 0x81, 0x4800000, 0xfff, 0x3, 0x3}) 14:17:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:27 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0xfffe, 0x6, 0x0}) 14:17:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:28 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x904c3, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x54, 0x4, 0x3, 0x5c, 0x7, 0x9}) 14:17:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:28 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x105000) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)={0x2}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, &(0x7f0000000000)={0x0, 0x14, 0x1d}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000040)={r2, 0x2}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000040)={r2, 0x2}) 14:17:28 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x16, 0x0}) 14:17:28 executing program 5: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, 0x140f, 0x800, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x10851) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f0000000300)={0x2, 0x6, 0x9, 0x8d22, 0x8, "9a40deeef702776dcb4306bd0fbfca4117a2d3", 0x401}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r6) creat(&(0x7f00000000c0)='./file0\x00', 0x100) llistxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180)=""/5, 0x5) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe0, 0x0) 14:17:28 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000000)={0x6, 0xafcc}) 14:17:28 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r1, 0x4b45, &(0x7f0000000040)={0x88, 0x0, 0x0}) 14:17:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000001040)={0x0, 0x0, 0x4, 0x40000000, 0x5, {0x0, 0x7530}, {0x3, 0x1, 0x7, 0x80, 0x0, 0xc0, "a543831c"}, 0x3, 0x3, @fd, 0x7, 0x0, r0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MTU={0x8, 0x4, 0x1000}]}, 0x44}}, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f00000013c0), &(0x7f0000001400)=0x4) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001200)=ANY=[@ANYBLOB="440000001000010400000000000000000000000077675aca520d1ca9bc79b51924c4ed193e04f8554d5f058a73f3c5a9c2fff0709f2ab04a3d511ab640637ece", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r5, @ANYBLOB="0800040000100000"], 0x44}}, 0x0) socket(0x1, 0x803, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001640)={&(0x7f0000001440)={0x16c, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKMODES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x16c}, 0x1, 0x0, 0x0, 0x80d4}, 0xc2895) r7 = open(0x0, 0x0, 0x0) r8 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000001100), &(0x7f0000001140)=0x10, 0x0) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000001180)=0x301b, 0x4) openat$cgroup_procs(r7, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r7, 0x81785501, &(0x7f0000000040)=""/4096) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:29 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x100, 0x3, 0x3f, 0x3f}]}) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000040)={0x100, 0x0, 0x0}) [ 1437.158680] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 14:17:29 executing program 3: perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000100dc) io_setup(0x0, &(0x7f0000000200)=0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f00000001c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000300)="c2", 0x1}]) fstat(r4, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r6 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f0000000000)='./file0\x00', r5, r7) lchown(&(0x7f0000000680)='./bus/file1\x00', 0x0, r7) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=0', @ANYRESDEC, @ANYBLOB, @ANYRESDEC=r7, @ANYBLOB=',blksize=0x0000000000000000,allow_other,fowner>', @ANYRESDEC, @ANYBLOB=',\x00']) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1437.256863] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 14:17:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x401, 0x3702114ad4478812) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:17:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:29 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000000)=[0x3], 0x1, 0x0, 0x3, 0x10000, 0x7, 0xffffffff, 0x7, {0xfbe3, 0x7, 0x8, 0x368, 0x6, 0x2, 0x7, 0x3, 0x100, 0x800, 0xe8, 0x5, 0x101, 0x0, "34dae244196a252512616de7a4fdc120a12a7b1a0de025357a38691c7bcb55a3"}}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) prctl$PR_SET_TSC(0x1a, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0xe, 0x0}) 14:17:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:29 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xcd7554201be4eef, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578e0fe11ba1f72e1a6311c32bb20a72c7961ae3b0e93ecf732848bb5210d64ec299a3205fd289945d48f59e0f0da0c8419e270dfedc6706c38d9dae45ecba437bf3267736b0df18de45a9dc72ffd327453e876695f8dda0dfbaab26fd0ab88c18cf13ef281ab83c11b573baabed7081400f732d1160ab955c10340325f716cfade26beac2eb56533d39e29f48d2330ff9cdedbed92d101b873e2c022a3e68d0238950e9ccf5dcbc028f5c0c310b5803adfb628e13d57b7cba14de58af6d17aec2aa8ab6525faf3c4fa823cc82aec322ca95c33337993f50a539591ac751d8571eea027be"], 0xf3) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:29 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) read$FUSE(r1, &(0x7f00000010c0), 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6800000002060100ffff00000000000000000000120003006269746d61703a69702c6d616300000005000400000000000900020073797a30000000001c0007800c00028008000140000000000c000180080001400000000005000500020000000500010006000000"], 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r5, &(0x7f0000000200)=@HCI_VENDOR_PKT, 0x2) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r6, 0x40106614, &(0x7f0000000000)) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0x0, 0x1}, 0x6) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:30 executing program 4: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:30 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x307a43) 14:17:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:30 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:30 executing program 2: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:30 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0xeb02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x4, @remote, 'veth1_to_bridge\x00'}}) 14:17:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x40}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xb6ff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0xfffffffc}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x9}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r2 = dup3(r0, r1, 0x80000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={r2, &(0x7f0000000280)="2045a098200a3f81eaad211aae2baeba46045368f6adb45c00f3f0658339802d8adef4a716f77e6f3a54d3b2527a35483aa94e0318779083460495fc7f9cf86a1577512ffc182cf034624f1e2847caddcc783f396508df06da1a35462d4e040674ee78259b05e8a669a39147cbba25f016618faf688c3bd4209ef0825de7e7343da6dfef6b7a7a010552f22868028047662be165b6b83d0580e3badf9b50df7bbb254638adeeae88b7defa9f266ae8b330e0bda4b22905864f22337a405c60c59c27c13a", &(0x7f0000000380)=""/251, 0x4}, 0x20) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r5, 0x1, 0x0, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8c5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x168, r5, 0x400, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x40, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x57}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x965}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_LINK={0x54, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbc22}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x48ce}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x51}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfac1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x18000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40000000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x1}, 0x3000c800) 14:17:30 executing program 2: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x68, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:40 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) mmap$snddsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x10010, r0, 0x4000) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000480)={0xffffffffffffffff}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000004c0)=0x4) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000440)={0x3, 0x1, 0x2, 0x3, 0x33, &(0x7f0000000040)}) 14:17:40 executing program 2: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:41 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x345}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x204100, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) 14:17:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc, 0x1}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = accept$unix(r5, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ppoll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x1202}, {r3, 0x200}, {r0, 0x2100}, {r4, 0x2011}, {r0, 0x1000}, {0xffffffffffffffff, 0x400}, {r6, 0x4428}, {r7, 0x4100}], 0x8, &(0x7f0000000280)={0x77359400}, &(0x7f0000000340)={[0x8]}, 0x8) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000000)={{r1}, 0x2, 0x9, 0xa2f}) 14:17:41 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$peeksig(0x4209, r2, &(0x7f00000000c0)={0x81, 0x1, 0x4}, &(0x7f0000000180)=[{}, {}, {}, {}]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 14:17:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:41 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r0, r0, &(0x7f0000000040)=0x8, 0x5) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:41 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = socket(0x2, 0x803, 0xff) close(r1) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x14, &(0x7f0000000000)={r4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r4, 0xe8, "72f060951addfe9517cc8174dd8bb9c5cd712c89ff8b6e04128ea6212130cf627f028c22cad1d42c0269f4223b8f21f4060f256a0f1b0f6bad30b32af771882e5e59a89f79d9714709da231530f74b574801b2b9be4f27dcfc4da6201ecd7d86098ed9da1d052d95986733875af707a05cbf79320243702e7bc0909641b0d53616b6989efd497f5a175601f1e0077661f103c60228373f1314cd04e72608f0d5d94987f57d97faf02b21488e2c6b1f4f07aee22f2fe128ecaa4c817745511e50fa9d3a2d17120c30463edada3cbd49543663cabdbad89846a2874a1c936eaf0e13da9e1e1ded211e"}, &(0x7f0000000180)=0xf0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x200, 0x202282) 14:17:41 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0xffff, 0xc, 0x0}) 14:17:41 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x4000, 0x0}) 14:17:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:42 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000bf4c8bf6b05238931f4dce9c0000116b36aa9287b30100001400018006000100"], 0x28}}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000100)={0xfffffffffffffffd, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x48, r2, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x93}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20044040}, 0x4000040) 14:17:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000280)={0x6, 0x7ff, 0x7, 0x2, 0x0, 0x2}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="640000000206010000000000000000000000000012000300686173683a6e65742c7082f341ea131a028a6f727400000005000400000000000500040001000a001c0007800c00028008000140000000000c00018008000140000000000500050002000000"], 0x64}}, 0x0) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x8c001, 0x0) recvfrom$l2tp(r6, &(0x7f0000000180)=""/207, 0xcf, 0x2100, 0x0, 0x0) close(r5) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x1ff, 0x101800) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 14:17:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, 0x0) 14:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000040)={0x0, 0x0, 0x0}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = socket(0x2, 0x803, 0xff) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x14, &(0x7f0000000000)={r5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000080)={r5, 0xb2, "8646f9b49b1274cf475f890422971024d844d17bf6cad3bd40c5c72f37c281fe43b4523d848b1f81c25db8e410710872df499a6edcbe1b9e3ab864fefac64672179ff23b8b12784af8aa97fd6d46b3f4ceef604a20383e6b4b7c983d6ee2947d84d145028fb5f8bc3c4f50abca180c0b4cab6d85b6bb647db4842fb783dec95729f34b9b9df8cbb872dc71f1dec43accdae12759b8c69c3d5007b1d3b394a8013d23ff5a89005c852f9aaab04f6cceb7b690"}, &(0x7f0000000140)=0xba) 14:17:42 executing program 3: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/95, 0x5f) r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008014}, 0x9000) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000180)={0x0, 0x0, 0x4}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, 0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4a02) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) 14:17:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r4, 0xee00, r5) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000200)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x1c) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, 0x0) 14:17:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, 0x0) 14:17:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) get_robust_list(r2, &(0x7f0000000140)=&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r2) 14:17:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:42 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x155800) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000080)) 14:17:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:42 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x3) clone(0x40010000, &(0x7f0000000040)="df5c6d8e822e16bd8a547713074aac2f03c96a7399dab126e6a1ccffb10e2380451809e055147c43266a68a44968c1f6c9b47a9e219673d0e15031859c019e7f7614693d45a13569056ca0b5688ad1f419a866ea899c6cda957f94d41582555cdac118dcbcf3846f161a26f03efcb27061e94c43bc30982850752db6797d21c8fd11f7d29f119bb0a7d27f715f07808fb346cf8096fabf95cd1a62c31100b988ac09407b757b0b466280552872b0b646d2c9b0c7577f3f7212efe8b5", &(0x7f0000000140), &(0x7f0000000000), &(0x7f0000000180)="40bccc0306a44aaf29c12ccc") 14:17:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0xc, 0x0}) 14:17:42 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)=0x9) 14:17:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) r5 = add_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)="e82e547a46575975227cfbace1f142b17692d09ad9b6d1222f5ca038e1150216893da152c54d896d02035da11f320c0fbba2f8151cbe1f0c194678d05cc71be6a66706799ec0340c168c1fab95cc5500bc0eb5e5ea7475f6561c420ce45742f9b12e7fb62e53cc7d0e76d10abd185b3713707492c6c5c5aeb93fb65f7e36f6395c106932b4fb6035db2e01d3f1c346e39334200cc0000dea368e4198495963fd7627345d4880da45396559dc4ac688e3", 0xb0, 0xfffffffffffffffc) keyctl$clear(0x7, r5) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0xc, 0x0}) 14:17:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:43 executing program 3: r0 = getegid() syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646973636172643d307867b6de0ed0d40b2b7525303030303030005225fad9200890340666926fd490f3a1be5836413c6712f9ccf4b0e9", @ANYRESHEX=r0, @ANYBLOB=',resize']) r1 = getegid() syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='discard=0x0000000000000009,gid=', @ANYRESHEX=r1, @ANYBLOB=',resize']) getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, r0, r1]) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 14:17:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_pts(r0, 0x690080) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="3d1700000000000000000500723135c66e69866e000001000000"], 0x20}}, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r6 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6}}, 0xfffffffffffffffe) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r5, @ANYBLOB="080000008010000076df6709d2be7eeb9cf0ebd88ada9648c3d4420f5ae6882ab649fcdad2e170f29b498d8e1d047e6806e40a79d2b33f66e2f7f3bb4de5f51fc0941cfcc060c9693252bc7af463d0"], 0x44}}, 0x0) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x20100, 0x0) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000300)={[0x7553, 0x2388, 0x6, 0xfffffffffffffffc, 0x20, 0x3ff, 0x0, 0x1, 0x0, 0x6, 0x101, 0x8, 0x3, 0x80, 0x7], 0x10000, 0x80400}) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000180)) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000326bd7000ffdbdf251700002014fbed24858eeb55df3d11934c370dc8e32c9092943f45d2a5711fd75fafdd7ece62e1cbd4892d82af0a4150a64b2f5080f4479e5c7b355ddc06d27a39b1b13756f596a379440fc1feb61b4b7ad8a4c03fef987b39e4d30aa018c4f14f7e6dbdf5fd94a96ab72f079a15e6a592128fc7fc675a8afe66295c96ebdb10169c847e82f9c3308339f8de8e509312", @ANYRES32=0x0, @ANYBLOB="08000100040000000800010003000000080001000000000008000300", @ANYRES32=r5, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x8040}, 0x40081) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)={0x15f, 0x1, 0x0}) 14:17:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0xc, 0x0}) [ 1451.361337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 14:17:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) [ 1451.409714] jfs: Unrecognized mount option "discard=0xg¶ÞÐÔ +u%000000" or missing value [ 1451.418548] audit: type=1326 audit(1584886663.370:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=526 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 14:17:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:43 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x40, 0x4a02) 14:17:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0x0, 0x0}) [ 1452.161008] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1452.176202] audit: type=1326 audit(1584886664.140:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=526 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 14:17:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) connect$netlink(r2, &(0x7f0000000240)=@unspec, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x90180, 0x0) sendmsg$IPSET_CMD_RENAME(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x580b5cd8d94d249b}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x5, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000880}, 0x8844) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 14:17:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x9effffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:44 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x4, {0xd30b, 0x81d2, 0x3, 0x8}}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) pipe(&(0x7f0000000480)={0xffffffffffffffff}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000004c0)=0x4) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000440)={0x3, 0x1, 0x2, 0x3, 0x33, &(0x7f0000000040)}) 14:17:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) 14:17:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xb6000000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5601, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1c0e}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:44 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3ff, 0x0) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{}, {r1, r2/1000+30000}}) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@int=0x2, 0x4) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = socket(0x2, 0x803, 0xff) close(r4) r5 = socket$inet(0x2, 0x4000000805, 0x2) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x14, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="000000002dd1fd8cd838a0a7a30ffa2f8a060000006e978b7b7f5898871cc228bf725766078053912f2dcf445039892bfac1c35929204edea7be7764210400000000000000795148362fb1d4271392fc80f30a87b7bdf4f0592a8b989187c29fc6e998ebc2aafc961c1298c29b7928320e88c42d32b9eb120c797d2a26194e8b8070e332d7391ae855a89ccf8a1f834fb11dd83c610bf4d60697ab57202c686c0c8171e199cb5a2f77dfa8645a85013a3406003e5001934c355fc5fd7f77817195b7afae715486860626d8b59f275241b1f9eb515798f299f41918b47013b6746b1071652803997d42983f33495b99eb2f8c32ec54d7125cff801ff3f16baa5e8b90151d5672a11a657b84d7aeaaccc129f3"], &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={r7, 0x2}, &(0x7f0000000180)=0x8) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={r8, 0x9}, 0x8) 14:17:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) flistxattr(r0, &(0x7f0000000040)=""/107, 0x6b) r1 = open(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r3, 0x1, 0x0, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8c5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb810}]}, @TIPC_NLA_NODE={0x1c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x2000}, 0x4040) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x1aa, 0xffff, 0x0}) 14:17:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xf0ffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:45 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x4503}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x2, 0x1, 0x0}) 14:17:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffa888}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:45 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x2, 0xe9}, {0x3f, 0xf0}, 0xfff, 0x2, 0x1}) sched_rr_get_interval(0x0, &(0x7f0000000000)) 14:17:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x70, 0x80, 0x9, 0x3, 0x9, 0x0, 0xff, 0x4200, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4cf2, 0x2, @perf_bp={&(0x7f00000000c0), 0xd}, 0x14000, 0x0, 0x9, 0x8, 0x1000000000000, 0x8001, 0x4}, r2, 0x9, r1, 0x2) r7 = socket$kcm(0x10, 0x2, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x30, r8, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x3}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz0\x00'}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r8, 0x424, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0xf, 0xff, @l2={'eth', 0x3a, 'gre0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20044050}, 0x101) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000200)={0xffff, 0x2, 0x2, 0x0, 0x0, [{{r5}, 0x3}, {{r5}, 0x5}]}) [ 1453.233140] FAULT_INJECTION: forcing a failure. [ 1453.233140] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.283822] CPU: 0 PID: 622 Comm: syz-executor.2 Not tainted 4.19.112-syzkaller #0 [ 1453.291664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.301024] Call Trace: [ 1453.303628] dump_stack+0x188/0x20d [ 1453.307281] should_fail.cold+0xa/0x1b [ 1453.311192] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1453.316325] __should_failslab+0x115/0x180 [ 1453.320575] should_failslab+0x5/0xf [ 1453.324313] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1453.328993] ? security_capable+0x8e/0xc0 [ 1453.333155] vt_do_kdgkb_ioctl+0x74/0xb60 [ 1453.337319] ? security_capable+0x8e/0xc0 [ 1453.341487] vt_ioctl+0x446/0x2310 [ 1453.345044] ? complete_change_console+0x390/0x390 [ 1453.349983] ? lock_downgrade+0x740/0x740 [ 1453.354142] ? check_preemption_disabled+0x41/0x280 [ 1453.359264] ? avc_has_perm_noaudit+0x33d/0x520 [ 1453.363948] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1453.369160] ? complete_change_console+0x390/0x390 [ 1453.374106] tty_ioctl+0x7a1/0x1420 [ 1453.377748] ? tty_vhangup+0x30/0x30 14:17:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x80) read$usbmon(r0, &(0x7f0000000080)=""/114, 0x72) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000000)=0x3) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) [ 1453.381482] ? cred_has_capability+0x162/0x2e0 [ 1453.386077] ? cred_has_capability+0x16d/0x2e0 [ 1453.390671] ? selinux_ipv4_output+0x50/0x50 [ 1453.395125] ? __fget+0x319/0x510 [ 1453.398609] ? tty_vhangup+0x30/0x30 [ 1453.402334] do_vfs_ioctl+0xcda/0x12e0 [ 1453.406235] ? selinux_file_ioctl+0x125/0x5d0 [ 1453.410743] ? check_preemption_disabled+0x41/0x280 [ 1453.415774] ? ioctl_preallocate+0x200/0x200 [ 1453.420190] ? selinux_file_mprotect+0x600/0x600 [ 1453.424955] ? __fget+0x340/0x510 [ 1453.428508] ? iterate_fd+0x350/0x350 14:17:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xfffff000}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3ff, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x8, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40054}, 0x800) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000080)={0x80}, 0x1) sched_yield() [ 1453.432322] ? security_file_ioctl+0x6c/0xb0 [ 1453.436737] ksys_ioctl+0x9b/0xc0 [ 1453.440211] __x64_sys_ioctl+0x6f/0xb0 [ 1453.444122] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1453.448723] do_syscall_64+0xf9/0x620 [ 1453.452543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.457743] RIP: 0033:0x45c849 [ 1453.460947] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.479848] RSP: 002b:00007fb4cf2b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1453.487555] RAX: ffffffffffffffda RBX: 00007fb4cf2b66d4 RCX: 000000000045c849 [ 1453.494825] RDX: 0000000020000000 RSI: 0000000000004b49 RDI: 0000000000000003 [ 1453.502093] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1453.509375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1453.516650] R13: 000000000000041b R14: 00000000004c6bb6 R15: 0000000000000000 14:17:45 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffff7f}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffff9e}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x46b}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fallocate(r1, 0x2, 0x10000, 0x7f0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = socket(0x2, 0x803, 0xff) close(r4) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x14, &(0x7f0000000000)={r7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000080)={r7, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={r8, 0x6d, "ebd8696ecfb1b95a5e8e78b639fc723a4cd325f6f8058f9a3da8ffce44a98272d21dd29a83877e5202f606c603194d093192ad17b8916bed3e10b9e37cba2f5b5c06a38ba40eb4f10c0d7b0c9516964187c1f0eee468ccddc0ac674aeb1f31d373f43dbddf6eb77aedbdb30dc5"}, &(0x7f0000000180)=0x75) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x2, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:46 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x4a02) 14:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xfffffff0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x5c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x0, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x3}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x5c}}, 0x0) close(r4) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000400)={0x7, "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"}) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) uselib(&(0x7f00000000c0)='./file0\x00') splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r7, 0xc0205647, &(0x7f0000000680)={0xf000000, 0x3, 0x2, r2, 0x0, &(0x7f0000000640)={0x9a090c, 0x3, [], @ptr=0x6}}) setsockopt$IPT_SO_SET_REPLACE(r6, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000100), &(0x7f00000003c0)=0xc) 14:17:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b2f, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b30, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffffff}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1454.432967] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1454.489364] ipt_CLUSTERIP: Please specify destination IP 14:17:46 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x81, 0x0, [0x6, 0x5, 0xd9, 0x5]}) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5514) 14:17:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204280}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x140c, 0x100, 0x70bd2c, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0xffffffff}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0xffffffff}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0x20000840) 14:17:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000440)={0x3, 0x1, 0xb, 0x10, 0x134, &(0x7f0000000040)}) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:46 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b31, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x2}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="6800000002060100000000000000000000000000120003006269746d61703a69702c6d616300000005000400000000000900020073797a30000000001c0007800c00028008000140000000000c000180190001400000000005000500020000000500010006000000"], 0x68}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b32, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf0ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:47 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000380)='pedit\x00', 0x6, 0x3) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0x7, 0x24ac, 0x4}) r2 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U-', 0x1}, 0x16, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001340)=ANY=[@ANYBLOB="02000000d13000b7d5bc5663fa34ced04c54989e399b64e37b4cd2a21ddc9a051e8c1c7fe4f67b0a26bf816215861d395d", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)={r3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000440)={r3, 0x5}, &(0x7f0000001300)=0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ptrace$setregs(0xf, r4, 0x0, &(0x7f0000000100)="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") ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)=r0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 14:17:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x3}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b33, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = getegid() syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='discard=0x0000000000000009,gid=', @ANYRESHEX=r2, @ANYBLOB="2c82f93b"]) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:47 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x4a02) 14:17:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) [ 1455.399009] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 14:17:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x120, 0x4, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'ipvlan0\x00'}]}, @NFTA_CHAIN_COUNTERS={0x64, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xad}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x800}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x101}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8f69}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3}]}, @NFTA_CHAIN_HOOK={0xc, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_COUNTERS={0x4c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x8d5}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}]}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}]}, 0x120}, 0x1, 0x0, 0x0, 0x400c091}, 0x4040001) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) fchmod(r1, 0x51) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) [ 1455.472262] JFS: discard option not supported on device [ 1455.512085] jfs: Unrecognized mount option "‚ù;" or missing value [ 1455.621224] JFS: discard option not supported on device [ 1455.645978] jfs: Unrecognized mount option "‚ù;" or missing value 14:17:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {0x5}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b34, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:48 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/vlan/vlan0\x00') r2 = syz_genetlink_get_family_id$batadv(0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x4, 0x1, 0x401, 0x0, 0x0, {0x2, 0x0, 0x5}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4081}, 0x48041) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x200, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x8800) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/vlan/vlan0\x00') r5 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_HARDIF(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x200, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x8800) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r5, 0x200, 0x170bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x81}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2b6d}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x804) 14:17:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x5}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x100000000) 14:17:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b35, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b36, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000003c0)={'netdevsim0\x00', 0x3f}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f0000000080)="c7111774b18b049ec980036b1f62490eb8640d0f81c9eb058c884002fa1bf9292a92b37025cdea95a8ebdf0944806d3f37e9d403ff77835caee06a7753baa4e215402198e1c8ed5c5cb5086a13fcb28bb98015f49eecde7dabe87a57d9e209d6e7410279084050a3e442c091e36163ac8de30915fa15c65928ee187f1bf6e5e166860f3ad2d9a10947629a2cbf789850607afa45333bd8c384d74b0a9d28ace722892c861fc31917524ba25a96c99008e3b12977de539ae37b009ae9fb5de27509fa7f76fbb6f778ccbb405e6af1449494334dc1d8e470dc198f41a397ee951470466408847fd1066f", &(0x7f0000000180)=""/251, &(0x7f0000000280)="cc4cb0f8bed92535962ceeff7c0ab2ce80acc8d8e23bf4f1d11c4e5dc52e638ac52eaa363ed46726321c4e7b068ee63370c50d63dd60d0f571e5e221c8d8c66e76128c7c5dba6d0ddd9488e8bde688a56b1d730753dd94513975e583a753a91a", &(0x7f0000000300)="fdd4477a48f831d3d6241c82efa0f56d83122f0739086d26ae6e809d16f1e2ddd21469ebe54d11b313bae9845641712d3bdbc88b6a3e36b2e66b5c4a242752219530e08f48f400c8978fdc443a696e92a5eb53801ef1754923c0db42b892393b0a92d3c5e17a6c6263c3727cef0573182c4e4239ad6fc3184cf12dee6256739c947269529dfb3998c813d0229843b0453d00a597a41fa5648d6a86505ca257fca6d55a0dfa884f300633", 0x3, 0x1}, 0x38) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$FBIOGETCMAP(r1, 0x4604, &(0x7f00000004c0)={0x2, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x1, 0x1, 0x6}]}, 0x68}}, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) splice(r4, 0x0, r3, 0x0, 0x4ffe9, 0x1) 14:17:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x10800, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/174, &(0x7f0000000140)=0xae) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x0}) 14:17:49 executing program 3: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001740)={0x53, 0xfffffffffffffffb, 0x68, 0x81, @scatter={0x7, 0x0, &(0x7f0000001500)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000080)=""/228, 0xe4}, {&(0x7f0000000180)=""/107, 0x6b}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000001280)=""/206, 0xce}, {&(0x7f0000001380)=""/188, 0xbc}, {&(0x7f0000001440)=""/161, 0xa1}]}, &(0x7f0000001580)="4cdd8912ab87017a2e20a0b5a93589f939bde3b9861e3f773c371ce71ac1b82e634a3434200e5657fce4de88f223e43512ef492bc0eb56c2c50bc055ea0b009610664ef839d5ea4d073e7658d5d9e858dac23eae11510af1c9c4a1b6e7371ec0e4bf5ccbe392e489", &(0x7f0000001600)=""/244, 0x5, 0x10000, 0x1, &(0x7f0000001700)}) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000000)={0x2, r1}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b37, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:49 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x202202) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000001140)={0x5, 0xc, 0x4, 0x8, 0x4, {}, {0x5, 0x0, 0x5, 0x2, 0x80, 0x2f, "ec954049"}, 0x7, 0x1, @planes=&(0x7f0000001100)={0xe1e, 0x2, @userptr, 0x2}, 0x101, 0x0, r0}) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f00000011c0)={0xa, 0x1}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000000080)) r4 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x180000000000, 0x4800) read$char_usb(r4, &(0x7f0000000100)=""/4096, 0x1000) 14:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3a, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xa}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3b, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xb}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r4, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000000)=[0x200, 0x9, 0x6], 0x3, 0xfff, 0xb8, 0x7fffffff, 0x1000, 0x3, 0x1, {0x101, 0x2e3, 0x19, 0x80, 0x200, 0x2, 0x7, 0xc000, 0x4, 0x40, 0x41, 0xff, 0xaf8, 0x2, "404dc53c5f8990bc0be69cdf9b3f5ce173c2b932d917598314deaa6cc844d86c"}}) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x64, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x6}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1}}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x7}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x10001}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x240088c0) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4200c0, 0x0) r8 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r8, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r8, 0x54a0) ioctl$BLKBSZSET(r7, 0x40081271, &(0x7f0000000100)=0x9) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r5, 0x0, 0x4ffe0, 0x0) 14:17:50 executing program 3: ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000000)={0x59aa, 0x3ff}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) 14:17:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3c, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xc}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b3d, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:50 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0xea02) 14:17:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:50 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) open$dir(&(0x7f0000000000)='./file0\x00', 0x2c8c82, 0xe4) 14:17:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b40, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x10}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b41, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:51 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x4a02) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x1, 0x19e, [0x20000140, 0x0, 0x0, 0x20000170, 0x200001a0], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x2}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x3, 0x21, 0x88a8, 'caif0\x00', 'macvlan1\x00', 'syzkaller1\x00', 'dummy0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3c5f814ab9b119f1}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @random="b6c457b109d4", [0xff, 0x0, 0xff, 0x0, 0xff], 0xde, 0xde, 0x10e, [@connlabel={{'connlabel\x00', 0x0, 0x8}, {{0xfffe, 0x2}}}, @quota={{'quota\x00', 0x0, 0x18}, {{0x1, 0x0, 0x4, {0x10001}}}}], [], @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}}]}]}, 0x216) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x501502, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x1) 14:17:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x6, 0x70, 0x1, 0x1, 0x7, 0x3f, 0x0, 0x3f, 0x216, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x5}, 0x0, 0x10ea74e0, 0xfffffffe, 0x8, 0xffffffffffffffc0, 0x40, 0xff}, r2, 0xffffffffffffffff, r3, 0x4) r4 = open(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xfff6) r5 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7733, 0x20180) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000180)="ed0822b0754514fc87ce31cd78a26fd857e0ede60004ae4dcf21c2537b051e03ed5e48585ace7ad335f9435a3e426494c0b1c25989eb53d0043e6e89a63a940d223c010db9dcd2076c2d4e45bd122982e94297d6c9314fb48d79aee34e5cf25c644eeef86488001c576e75835dd9d0aaa263bfca70c27f24ed910840c63a697ba6c64af131d3e2d0", 0x88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r8) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r7, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r6, 0x0, r8, 0x0, 0x4ffe0, 0x0) 14:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x60}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b44, &(0x7f0000000000)={0xffff, 0x0, 0x0}) [ 1459.191299] ipt_CLUSTERIP: Please specify destination IP 14:17:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:51 executing program 3: pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x8, 0x9}, {0x8000, 0x83e6}, {0x845, 0x401}, {0xff, 0x9}, {0x3f, 0x6}, {0x2, 0xfffa}, {0x40}, {0x1}]}) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r1 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000180)=0x9, &(0x7f00000001c0)=0x2) pipe(&(0x7f0000000000)) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 14:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b45, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xb6}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:51 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x4, 0xffff8001, 0x1, 0x0, 0x9}) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e21, 0xf7d, @loopback, 0x6}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) 14:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b46, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xf0}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6800000002060100000000000000000000000000120003006269746d61703a69702c6d616300000005000400000000000900020073797a30000000001c0007800c00028008000140000000000c000180080001400000000005000500020000000500010006000000f381c5ea11b10721687716daecc72bedec1c91a22b89389cb4004e598335417ee5df0c47e89fba73ce61f26c552ee1590681410113e94145ea15d8902dfe002d4cc649bddd3055753c34f1259627a258712e8c41c9a58932df9f382b20e898489c5fb2f47518357fb2a2b718e2b5742bcb738cb82aaae50cb2926e03"], 0x68}}, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) splice(r0, 0x0, r4, 0x0, 0x4ffde, 0x0) 14:17:51 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x4b02) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r0) r1 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000000c0)='})\\(wlan1(#md5sum*user]\x00', r0) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffb) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0xe, 0x0) 14:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b47, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x300}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x500}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b48, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:52 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4a02) r0 = semget(0x2, 0x3, 0x100) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000000)=""/33) 14:17:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x600}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1c0e0000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4a, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x45030000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_SECCOMP(0x15) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x68, 0x2, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x68}}, 0x0) close(r4) r5 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$RTC_PLL_GET(r5, 0x80207011, &(0x7f0000000100)) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:17:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x900}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4b, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xa00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4c, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xb00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4d, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4e, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xc00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b52, &(0x7f0000000000)={0xffff, 0x0, 0x0}) 14:17:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe58, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe44, 0x1, [@m_pedit={0xe40, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe2c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x8, 0x5, 0x0, 0x1, [{0x4, 0x3}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}}}]}]}, 0xe58}}, 0x0) 14:17:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe00}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001300)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe3c, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x18, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0xc}, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xe1c}]}}]}, {0x4}}}]}]}, 0xe68}}, 0x0) 14:17:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b60, &(0x7f0000000000)={0xffff, 0x0, 0x0}) [ 1461.981641] ================================================================== [ 1461.981744] BUG: KASAN: global-out-of-bounds in fbcon_get_font+0x28d/0x5b0 [ 1461.981772] Read of size 32 at addr ffffffff87ad63e0 by task syz-executor.2/1025 [ 1461.981776] [ 1461.981788] CPU: 0 PID: 1025 Comm: syz-executor.2 Not tainted 4.19.112-syzkaller #0 [ 1461.981796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.981800] Call Trace: [ 1461.981815] dump_stack+0x188/0x20d [ 1461.981830] ? fbcon_get_font+0x28d/0x5b0 [ 1461.981846] print_address_description.cold+0x5/0x212 [ 1461.981860] ? fbcon_get_font+0x28d/0x5b0 [ 1461.981872] kasan_report.cold+0x88/0x2b9 [ 1461.981887] memcpy+0x20/0x50 [ 1461.981901] fbcon_get_font+0x28d/0x5b0 [ 1461.981915] ? display_to_var+0x7b0/0x7b0 [ 1461.981928] con_font_op+0x1f7/0x1130 [ 1461.981943] ? con_write+0xe0/0xe0 [ 1461.981957] ? cap_capable+0x1eb/0x250 [ 1461.981972] ? security_capable+0x8e/0xc0 [ 1461.981991] vt_ioctl+0xc6c/0x2310 [ 1461.982005] ? complete_change_console+0x390/0x390 [ 1461.982015] ? avc_has_extended_perms+0x9c6/0x1030 [ 1461.982037] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1461.982051] ? complete_change_console+0x390/0x390 [ 1461.982065] tty_ioctl+0x7a1/0x1420 [ 1461.982077] ? tty_vhangup+0x30/0x30 [ 1461.982091] ? mark_held_locks+0xf0/0xf0 [ 1461.982106] ? perf_trace_lock_acquire+0xf5/0x530 [ 1461.982128] ? tty_vhangup+0x30/0x30 [ 1461.982141] do_vfs_ioctl+0xcda/0x12e0 [ 1461.982154] ? selinux_file_ioctl+0x46c/0x5d0 [ 1461.982166] ? selinux_file_ioctl+0x125/0x5d0 [ 1461.982179] ? check_preemption_disabled+0x41/0x280 [ 1461.982190] ? ioctl_preallocate+0x200/0x200 [ 1461.982203] ? selinux_file_mprotect+0x600/0x600 [ 1461.982215] ? __fget+0x340/0x510 [ 1461.982230] ? iterate_fd+0x350/0x350 [ 1461.982249] ? security_file_ioctl+0x6c/0xb0 [ 1461.982263] ksys_ioctl+0x9b/0xc0 [ 1461.982276] __x64_sys_ioctl+0x6f/0xb0 [ 1461.982296] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1461.982311] do_syscall_64+0xf9/0x620 [ 1461.982331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.982345] RIP: 0033:0x45c849 [ 1461.982362] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.982371] RSP: 002b:00007fb4cf2b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1461.982394] RAX: ffffffffffffffda RBX: 00007fb4cf2b66d4 RCX: 000000000045c849 [ 1461.982404] RDX: 0000000020000000 RSI: 0000000000004b60 RDI: 0000000000000003 [ 1461.982414] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1461.982423] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1461.982432] R13: 000000000000041b R14: 00000000004c6bb6 R15: 000000000076bf0c [ 1461.982450] [ 1461.982454] The buggy address belongs to the variable: [ 1461.982481] fontdata_8x16+0x1000/0x1120 [ 1461.982484] [ 1461.982488] Memory state around the buggy address: [ 1461.982499] ffffffff87ad6280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1461.982509] ffffffff87ad6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1461.982518] >ffffffff87ad6380: 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa [ 1461.982524] ^ [ 1461.982533] ffffffff87ad6400: 06 fa fa fa fa fa fa fa 05 fa fa fa fa fa fa fa [ 1461.982541] ffffffff87ad6480: 06 fa fa fa fa fa fa fa 00 00 03 fa fa fa fa fa [ 1461.982545] ================================================================== [ 1461.982549] Disabling lock debugging due to kernel taint [ 1461.985229] Kernel panic - not syncing: panic_on_warn set ... [ 1461.985229] [ 1461.985244] CPU: 0 PID: 1025 Comm: syz-executor.2 Tainted: G B 4.19.112-syzkaller #0 [ 1461.985250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.985253] Call Trace: [ 1461.985269] dump_stack+0x188/0x20d [ 1461.985284] panic+0x26a/0x50e [ 1461.985296] ? __warn_printk+0xf3/0xf3 [ 1461.985310] ? preempt_schedule_common+0x4a/0xc0 [ 1461.985321] ? fbcon_get_font+0x28d/0x5b0 [ 1461.985332] ? ___preempt_schedule+0x16/0x18 [ 1461.985341] ? trace_hardirqs_on+0x55/0x210 [ 1461.985352] ? fbcon_get_font+0x28d/0x5b0 [ 1461.985362] kasan_end_report+0x43/0x49 [ 1461.985372] kasan_report.cold+0xa4/0x2b9 [ 1461.985382] memcpy+0x20/0x50 [ 1461.985400] fbcon_get_font+0x28d/0x5b0 [ 1461.985411] ? display_to_var+0x7b0/0x7b0 [ 1461.985423] con_font_op+0x1f7/0x1130 [ 1461.985435] ? con_write+0xe0/0xe0 [ 1461.985445] ? cap_capable+0x1eb/0x250 [ 1461.985456] ? security_capable+0x8e/0xc0 [ 1461.985469] vt_ioctl+0xc6c/0x2310 [ 1461.985480] ? complete_change_console+0x390/0x390 [ 1461.985489] ? avc_has_extended_perms+0x9c6/0x1030 [ 1461.985503] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1461.985514] ? complete_change_console+0x390/0x390 [ 1461.985523] tty_ioctl+0x7a1/0x1420 [ 1461.985533] ? tty_vhangup+0x30/0x30 [ 1461.985543] ? mark_held_locks+0xf0/0xf0 [ 1461.985554] ? perf_trace_lock_acquire+0xf5/0x530 [ 1461.985569] ? tty_vhangup+0x30/0x30 [ 1461.985579] do_vfs_ioctl+0xcda/0x12e0 [ 1461.985589] ? selinux_file_ioctl+0x46c/0x5d0 [ 1461.985599] ? selinux_file_ioctl+0x125/0x5d0 [ 1461.985609] ? check_preemption_disabled+0x41/0x280 [ 1461.985618] ? ioctl_preallocate+0x200/0x200 [ 1461.985628] ? selinux_file_mprotect+0x600/0x600 [ 1461.985637] ? __fget+0x340/0x510 [ 1461.985648] ? iterate_fd+0x350/0x350 [ 1461.985661] ? security_file_ioctl+0x6c/0xb0 [ 1461.985671] ksys_ioctl+0x9b/0xc0 [ 1461.985680] __x64_sys_ioctl+0x6f/0xb0 [ 1461.985690] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1461.985699] do_syscall_64+0xf9/0x620 [ 1461.985710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.985717] RIP: 0033:0x45c849 [ 1461.985728] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.985734] RSP: 002b:00007fb4cf2b5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1461.985744] RAX: ffffffffffffffda RBX: 00007fb4cf2b66d4 RCX: 000000000045c849 [ 1461.985750] RDX: 0000000020000000 RSI: 0000000000004b60 RDI: 0000000000000003 [ 1461.985756] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1461.985762] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1461.985767] R13: 000000000000041b R14: 00000000004c6bb6 R15: 000000000076bf0c [ 1461.987045] Kernel Offset: disabled [ 1462.588433] Rebooting in 86400 seconds..