0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:26 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1019.723317][T12964] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:16:27 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:27 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:27 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:27 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:27 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:16:28 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:29 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:16:29 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:29 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:29 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d9"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:29 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:30 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d9"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1023.298621][T13037] syz-executor.3 invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=1000 [ 1023.328939][T13037] CPU: 1 PID: 13037 Comm: syz-executor.3 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1023.339112][T13037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.349144][T13037] Call Trace: [ 1023.352422][T13037] dump_stack+0x1b0/0x228 [ 1023.356748][T13037] ? devkmsg_release+0x127/0x127 [ 1023.361660][T13037] ? ___ratelimit+0x3bf/0x560 [ 1023.366316][T13037] ? show_regs_print_info+0x18/0x18 [ 1023.371490][T13037] ? _raw_spin_lock+0xa1/0x170 [ 1023.376229][T13037] ? radix_tree_cpu_dead+0x180/0x180 [ 1023.381491][T13037] dump_header+0xd8/0x730 [ 1023.385805][T13037] oom_kill_process+0xd7/0x280 [ 1023.390553][T13037] out_of_memory+0x5b6/0x890 [ 1023.395119][T13037] ? unregister_oom_notifier+0x20/0x20 [ 1023.400551][T13037] ? __kasan_check_write+0x14/0x20 [ 1023.405637][T13037] __alloc_pages_nodemask+0x27e3/0x3010 [ 1023.411179][T13037] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1023.416699][T13037] ? trace_event_raw_event_rcu_utilization+0x170/0x170 [ 1023.423536][T13037] ? trace_event_raw_event_rcu_utilization+0x170/0x170 [ 1023.430360][T13037] ? __kasan_check_read+0x11/0x20 [ 1023.435358][T13037] ? __perf_event_task_sched_in+0x4ed/0x550 [ 1023.441236][T13037] ? __kasan_check_read+0x11/0x20 [ 1023.448320][T13037] wp_page_copy+0x199/0x10e0 [ 1023.452889][T13037] ? add_mm_rss_vec+0x270/0x270 [ 1023.457717][T13037] ? vm_normal_page+0x1e1/0x1f0 [ 1023.462542][T13037] do_wp_page+0x48d/0x14b0 [ 1023.466935][T13037] ? _raw_spin_lock+0xa1/0x170 [ 1023.471681][T13037] ? do_swap_page+0x1530/0x1530 [ 1023.476520][T13037] handle_mm_fault+0x13c0/0x41c0 [ 1023.481434][T13037] ? __perf_event_task_sched_in+0x4ed/0x550 [ 1023.487307][T13037] ? finish_fault+0x230/0x230 [ 1023.491976][T13037] ? perf_pmu_sched_task+0x370/0x370 [ 1023.497250][T13037] ? vmacache_find+0x2ec/0x4d0 [ 1023.501992][T13037] do_user_addr_fault+0x516/0xb50 [ 1023.506999][T13037] __do_page_fault+0xa0/0x160 [ 1023.511655][T13037] do_page_fault+0x74/0x390 [ 1023.516133][T13037] page_fault+0x2f/0x40 [ 1023.520267][T13037] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x30 [ 1023.526828][T13037] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 1023.546422][T13037] RSP: 0018:ffff88802a377828 EFLAGS: 00010206 [ 1023.553328][T13037] RAX: ffffffff81f69101 RBX: 00000000206e1500 RCX: 0000000000000500 [ 1023.561279][T13037] RDX: 0000000000001000 RSI: ffff88802a3adb00 RDI: 00000000206e1000 [ 1023.569323][T13037] RBP: ffff88802a377858 R08: dffffc0000000000 R09: ffffed1005475c00 [ 1023.577268][T13037] R10: 0000000000000000 R11: 0000000000000000 R12: 00007ffffffff000 [ 1023.585233][T13037] R13: 0000000000001000 R14: ffff88802a3ad000 R15: 00000000206e0500 [ 1023.593216][T13037] ? copyout+0x41/0xb0 [ 1023.597286][T13037] ? copyout+0x92/0xb0 [ 1023.601345][T13037] copy_page_to_iter+0x3ab/0xbe0 [ 1023.606265][T13037] pipe_to_user+0xb3/0x160 [ 1023.610707][T13037] __splice_from_pipe+0x2b7/0x850 [ 1023.615717][T13037] ? user_page_pipe_buf_steal+0xc0/0xc0 [ 1023.621243][T13037] do_vmsplice+0x240/0xe70 [ 1023.625644][T13037] ? futex_exit_release+0xd0/0xd0 [ 1023.630655][T13037] ? __kasan_check_write+0x14/0x20 [ 1023.635742][T13037] ? _raw_spin_lock+0xa1/0x170 [ 1023.640486][T13037] ? _raw_spin_trylock_bh+0x190/0x190 [ 1023.645830][T13037] ? write_pipe_buf+0x1d0/0x1d0 [ 1023.650665][T13037] ? check_stack_object+0x124/0x140 [ 1023.655846][T13037] ? __kasan_check_write+0x14/0x20 [ 1023.660961][T13037] ? _copy_from_user+0xa8/0xe0 [ 1023.665700][T13037] ? rw_copy_check_uvector+0x2a5/0x300 [ 1023.671164][T13037] ? import_iovec+0x171/0x340 [ 1023.675824][T13037] ? dup_iter+0x130/0x130 [ 1023.680129][T13037] ? call_rcu+0xb/0x10 [ 1023.684186][T13037] ? __fdget+0x17c/0x200 [ 1023.688402][T13037] __se_sys_vmsplice+0x1cc/0x2c0 [ 1023.693323][T13037] ? _raw_spin_trylock_bh+0x190/0x190 [ 1023.698673][T13037] ? __x64_sys_vmsplice+0xb0/0xb0 [ 1023.703945][T13037] ? __kasan_check_read+0x11/0x20 [ 1023.708999][T13037] ? _copy_to_user+0x92/0xb0 [ 1023.713570][T13037] ? put_timespec64+0x106/0x150 [ 1023.718542][T13037] ? ktime_get_raw+0x130/0x130 [ 1023.723295][T13037] ? get_timespec64+0x1c0/0x1c0 [ 1023.728130][T13037] ? __kasan_check_read+0x11/0x20 [ 1023.733152][T13037] ? __ia32_sys_clock_settime+0x230/0x230 [ 1023.738887][T13037] __x64_sys_vmsplice+0x9b/0xb0 [ 1023.743745][T13037] do_syscall_64+0xc0/0x100 [ 1023.748251][T13037] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1023.754131][T13037] RIP: 0033:0x45b399 [ 1023.758031][T13037] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1023.777614][T13037] RSP: 002b:00007fd9cc49dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 1023.786002][T13037] RAX: ffffffffffffffda RBX: 00007fd9cc49e6d4 RCX: 000000000045b399 [ 1023.793958][T13037] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005 [ 1023.801914][T13037] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1023.809862][T13037] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1023.817807][T13037] R13: 0000000000000c11 R14: 00000000004ccec9 R15: 000000000075bf2c [ 1023.850038][T13037] Mem-Info: [ 1023.855530][T13037] active_anon:1436501 inactive_anon:62 isolated_anon:0 [ 1023.855530][T13037] active_file:383 inactive_file:404 isolated_file:84 [ 1023.855530][T13037] unevictable:0 dirty:96 writeback:0 unstable:0 [ 1023.855530][T13037] slab_reclaimable:6637 slab_unreclaimable:86906 [ 1023.855530][T13037] mapped:52904 shmem:69 pagetables:27228 bounce:0 [ 1023.855530][T13037] free:12643 free_pcp:215 free_cma:0 [ 1023.948077][T13037] Node 0 active_anon:5745976kB inactive_anon:248kB active_file:1124kB inactive_file:1124kB unevictable:0kB isolated(anon):0kB isolated(file):260kB mapped:210536kB dirty:84kB writeback:40kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1023.977056][T13037] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1024.003433][T13037] lowmem_reserve[]: 0 2926 6432 6432 [ 1024.009894][T13037] DMA32 free:18760kB min:4660kB low:7656kB high:10652kB active_anon:2831972kB inactive_anon:0kB active_file:160kB inactive_file:252kB unevictable:0kB writepending:8kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:12896kB pagetables:25924kB bounce:0kB free_pcp:24kB local_pcp:8kB free_cma:0kB [ 1024.039340][T13037] lowmem_reserve[]: 0 0 3506 3506 [ 1024.044893][T13037] Normal free:17448kB min:9684kB low:13272kB high:16860kB active_anon:2913976kB inactive_anon:240kB active_file:744kB inactive_file:356kB unevictable:0kB writepending:288kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20480kB pagetables:82864kB bounce:0kB free_pcp:1692kB local_pcp:624kB free_cma:0kB [ 1024.075345][T13037] lowmem_reserve[]: 0 0 0 0 [ 1024.080375][T13037] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1024.095327][T13037] DMA32: 217*4kB (UMEH) 74*8kB (UMEH) 22*16kB (UMEH) 43*32kB (UMEH) 61*64kB (UMEH) 25*128kB (UM) 8*256kB (UM) 3*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 18996kB [ 1024.113152][T13037] Normal: 1037*4kB (UME) 377*8kB (UMEH) 101*16kB (ME) 114*32kB (UMEH) 69*64kB (UM) 2*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 17100kB [ 1024.128847][T13037] 434 total pagecache pages [ 1024.133654][T13037] 0 pages in swap cache [ 1024.137977][T13037] Swap cache stats: add 0, delete 0, find 0/0 [ 1024.144260][T13037] Free swap = 0kB [ 1024.148027][T13037] Total swap = 0kB [ 1024.151779][T13037] 1965979 pages RAM [ 1024.155578][T13037] 0 pages HighMem/MovableOnly [ 1024.168858][T13037] 314802 pages reserved [ 1024.173032][T13037] 0 pages cma reserved [ 1024.177092][T13037] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.4,pid=1315,uid=0 [ 1024.244464][T13037] Out of memory: Killed process 1315 (syz-executor.4) total-vm:72848kB, anon-rss:16548kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 18:16:31 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d9"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:31 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:31 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:31 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:31 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:16:31 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(0x0, 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:32 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:32 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(0x0, 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:32 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d9"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:32 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:16:32 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1026.313945][T13140] modprobe invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 1026.348304][T13140] CPU: 0 PID: 13140 Comm: modprobe Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1026.357971][T13140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.368022][T13140] Call Trace: [ 1026.371322][T13140] dump_stack+0x1b0/0x228 [ 1026.375649][T13140] ? devkmsg_release+0x127/0x127 [ 1026.380599][T13140] ? ___ratelimit+0x3bf/0x560 [ 1026.385285][T13140] ? show_regs_print_info+0x18/0x18 [ 1026.390491][T13140] ? _raw_spin_lock+0xa1/0x170 [ 1026.395264][T13140] ? radix_tree_cpu_dead+0x180/0x180 [ 1026.400578][T13140] dump_header+0xd8/0x730 [ 1026.404912][T13140] oom_kill_process+0xd7/0x280 [ 1026.409680][T13140] out_of_memory+0x5b6/0x890 [ 1026.414284][T13140] ? unregister_oom_notifier+0x20/0x20 [ 1026.419769][T13140] ? __kasan_check_write+0x14/0x20 [ 1026.424969][T13140] __alloc_pages_nodemask+0x27e3/0x3010 [ 1026.430527][T13140] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1026.436079][T13140] ? __rcu_read_lock+0x50/0x50 [ 1026.440842][T13140] pte_alloc_one+0x1f/0xc0 [ 1026.445287][T13140] handle_mm_fault+0x1b7f/0x41c0 [ 1026.450249][T13140] ? finish_fault+0x230/0x230 [ 1026.454946][T13140] ? __free_pages+0x8e/0x120 [ 1026.459538][T13140] ? memset+0x31/0x40 [ 1026.463519][T13140] ? vmacache_update+0xb7/0x120 [ 1026.468387][T13140] ? find_vma+0x140/0x160 [ 1026.472723][T13140] do_user_addr_fault+0x516/0xb50 [ 1026.477795][T13140] __do_page_fault+0xa0/0x160 [ 1026.482509][T13140] do_page_fault+0x74/0x390 [ 1026.487014][T13140] page_fault+0x2f/0x40 [ 1026.491167][T13140] RIP: 0033:0x7f2fef83b90a [ 1026.495594][T13140] Code: Bad RIP value. [ 1026.499650][T13140] RSP: 002b:00007ffd953dcd50 EFLAGS: 00010246 [ 1026.505729][T13140] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f2fef83b90a [ 1026.513704][T13140] RDX: 00007ffd953dceb8 RSI: 0000000000000000 RDI: 0000000000100011 [ 1026.521670][T13140] RBP: 00007ffd953dcdf0 R08: 00007f2fefb84be0 R09: 0000000000000000 [ 1026.529774][T13140] R10: 0000000000000008 R11: 0000000000000246 R12: 000055d0bfef5b80 [ 1026.537753][T13140] R13: 000055d0bfef27c4 R14: 0000000000000000 R15: 0000000000000000 [ 1026.591063][T13140] Mem-Info: [ 1026.594275][T13140] active_anon:1438800 inactive_anon:62 isolated_anon:0 [ 1026.594275][T13140] active_file:156 inactive_file:185 isolated_file:26 [ 1026.594275][T13140] unevictable:0 dirty:77 writeback:25 unstable:0 [ 1026.594275][T13140] slab_reclaimable:6645 slab_unreclaimable:86802 [ 1026.594275][T13140] mapped:52496 shmem:69 pagetables:27263 bounce:0 [ 1026.594275][T13140] free:10994 free_pcp:0 free_cma:0 [ 1026.632791][T13140] Node 0 active_anon:5755200kB inactive_anon:248kB active_file:624kB inactive_file:620kB unevictable:0kB isolated(anon):0kB isolated(file):104kB mapped:209884kB dirty:308kB writeback:100kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1026.657543][T13140] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1026.683943][T13140] lowmem_reserve[]: 0 2926 6432 6432 [ 1026.689527][T13140] DMA32 free:17372kB min:4660kB low:7656kB high:10652kB active_anon:2831796kB inactive_anon:20kB active_file:404kB inactive_file:252kB unevictable:0kB writepending:160kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13152kB pagetables:26392kB bounce:0kB free_pcp:76kB local_pcp:0kB free_cma:0kB [ 1026.718881][T13140] lowmem_reserve[]: 0 0 3506 3506 [ 1026.724148][T13140] Normal free:10700kB min:13780kB low:17368kB high:20956kB active_anon:2922468kB inactive_anon:228kB active_file:824kB inactive_file:1204kB unevictable:0kB writepending:348kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20512kB pagetables:82660kB bounce:0kB free_pcp:84kB local_pcp:0kB free_cma:0kB [ 1026.754053][T13140] lowmem_reserve[]: 0 0 0 0 [ 1026.758736][T13140] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1026.772567][T13140] DMA32: 133*4kB (UMEH) 115*8kB (UMEH) 23*16kB (UMEH) 38*32kB (UMEH) 55*64kB (UMEH) 23*128kB (UM) 7*256kB (UM) 3*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (M) = 17948kB [ 1026.819660][T13140] Normal: 728*4kB (UME) 378*8kB (MEH) 125*16kB (UME) 86*32kB (UMEH) 53*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 14080kB [ 1026.844577][T13140] 516 total pagecache pages [ 1026.854682][T13140] 0 pages in swap cache [ 1026.858887][T13140] Swap cache stats: add 0, delete 0, find 0/0 [ 1026.865017][T13140] Free swap = 0kB [ 1026.868734][T13140] Total swap = 0kB [ 1026.884489][T13140] 1965979 pages RAM [ 1026.888438][T13140] 0 pages HighMem/MovableOnly [ 1026.893171][T13140] 314802 pages reserved [ 1026.897325][T13140] 0 pages cma reserved [ 1026.901451][T13140] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=1091,uid=0 [ 1026.915531][T13140] Out of memory: Killed process 1091 (syz-executor.2) total-vm:72980kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:16:34 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x0, &(0x7f0000000480)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:16:34 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(0x0, 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:34 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:35 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:35 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:36 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{0x0}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:36 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:16:36 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:36 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:36 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1029.622735][ T7173] syz-executor.0 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1029.649645][ T7173] CPU: 1 PID: 7173 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1029.659746][ T7173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1029.670147][ T7173] Call Trace: [ 1029.673443][ T7173] dump_stack+0x1b0/0x228 [ 1029.677785][ T7173] ? devkmsg_release+0x127/0x127 [ 1029.682723][ T7173] ? ___ratelimit+0x3bf/0x560 [ 1029.687527][ T7173] ? show_regs_print_info+0x18/0x18 [ 1029.692815][ T7173] ? _raw_spin_lock+0xa1/0x170 [ 1029.697613][ T7173] ? radix_tree_cpu_dead+0x180/0x180 [ 1029.702899][ T7173] dump_header+0xd8/0x730 [ 1029.707510][ T7173] oom_kill_process+0xd7/0x280 [ 1029.712280][ T7173] out_of_memory+0x5b6/0x890 [ 1029.716876][ T7173] ? unregister_oom_notifier+0x20/0x20 [ 1029.722340][ T7173] ? __kasan_check_write+0x14/0x20 [ 1029.727462][ T7173] __alloc_pages_nodemask+0x27e3/0x3010 [ 1029.733030][ T7173] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1029.738616][ T7173] ? __kasan_check_read+0x11/0x20 [ 1029.743656][ T7173] ? __mark_inode_dirty+0x4d8/0xc30 [ 1029.748893][ T7173] ? generic_update_time+0x211/0x230 [ 1029.754183][ T7173] ? file_update_time+0x36a/0x3d0 [ 1029.759474][ T7173] ? file_remove_privs+0x630/0x630 [ 1029.764717][ T7173] wp_page_copy+0x1c4/0x10e0 [ 1029.769315][ T7173] ? __sb_end_write+0xa8/0xf0 [ 1029.773996][ T7173] ? add_mm_rss_vec+0x270/0x270 [ 1029.778895][ T7173] ? __kasan_check_read+0x11/0x20 [ 1029.783917][ T7173] do_wp_page+0x657/0x14b0 [ 1029.788350][ T7173] ? _raw_spin_lock+0xa1/0x170 [ 1029.793109][ T7173] ? do_swap_page+0x1530/0x1530 [ 1029.797965][ T7173] handle_mm_fault+0x13c0/0x41c0 [ 1029.802907][ T7173] ? finish_fault+0x230/0x230 [ 1029.807584][ T7173] ? vmacache_update+0xb7/0x120 [ 1029.812582][ T7173] do_user_addr_fault+0x516/0xb50 [ 1029.817607][ T7173] __do_page_fault+0xa0/0x160 [ 1029.822394][ T7173] do_page_fault+0x74/0x390 [ 1029.826992][ T7173] page_fault+0x2f/0x40 [ 1029.831143][ T7173] RIP: 0033:0x4036f2 [ 1029.835021][ T7173] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 c9 a6 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 e9 5b 05 00 48 [ 1029.854721][ T7173] RSP: 002b:00007ffea2904d40 EFLAGS: 00010246 [ 1029.860778][ T7173] RAX: 0000000000000000 RBX: 00000000000fb5a7 RCX: 0000000000414e50 [ 1029.868755][ T7173] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffea2905e70 [ 1029.876819][ T7173] RBP: 000000000000110c R08: 0000000000000001 R09: 000000000268d940 [ 1029.885018][ T7173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea2905e70 [ 1029.892983][ T7173] R13: 00007ffea2905e60 R14: 0000000000000000 R15: 00007ffea2905e70 [ 1030.017819][ T7173] Mem-Info: [ 1030.021389][ T7173] active_anon:1437935 inactive_anon:62 isolated_anon:0 [ 1030.021389][ T7173] active_file:315 inactive_file:328 isolated_file:32 [ 1030.021389][ T7173] unevictable:0 dirty:72 writeback:2 unstable:0 [ 1030.021389][ T7173] slab_reclaimable:6695 slab_unreclaimable:86605 [ 1030.021389][ T7173] mapped:52769 shmem:69 pagetables:27350 bounce:0 [ 1030.021389][ T7173] free:11493 free_pcp:231 free_cma:0 [ 1030.064842][ T7173] Node 0 active_anon:5751740kB inactive_anon:248kB active_file:1260kB inactive_file:1312kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:211076kB dirty:288kB writeback:8kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1030.112880][ T7173] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1030.143841][ T7173] lowmem_reserve[]: 0 2926 6432 6432 [ 1030.149638][ T7173] DMA32 free:17448kB min:4660kB low:7656kB high:10652kB active_anon:2831492kB inactive_anon:16kB active_file:964kB inactive_file:908kB unevictable:0kB writepending:168kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:12832kB pagetables:26640kB bounce:0kB free_pcp:92kB local_pcp:56kB free_cma:0kB [ 1030.179693][ T7173] lowmem_reserve[]: 0 0 3506 3506 [ 1030.185417][ T7173] Normal free:13124kB min:17876kB low:21464kB high:25052kB active_anon:2919948kB inactive_anon:232kB active_file:296kB inactive_file:404kB unevictable:0kB writepending:128kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20736kB pagetables:82760kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 1030.215745][ T7173] lowmem_reserve[]: 0 0 0 0 [ 1030.220848][ T7173] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1030.235758][ T7173] DMA32: 140*4kB (UMEH) 42*8kB (UMEH) 26*16kB (UMEH) 32*32kB (UEH) 57*64kB (UMEH) 28*128kB (UM) 7*256kB (UM) 3*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (E) = 18016kB [ 1030.252924][ T7173] Normal: 178*4kB (MEH) 359*8kB (UMEH) 195*16kB (UMEH) 91*32kB (UMEH) 62*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 13584kB [ 1030.307140][ T7173] 244 total pagecache pages [ 1030.321426][ T7173] 0 pages in swap cache [ 1030.327114][ T7173] Swap cache stats: add 0, delete 0, find 0/0 [ 1030.334676][ T7173] Free swap = 0kB [ 1030.339779][ T7173] Total swap = 0kB [ 1030.344315][ T7173] 1965979 pages RAM [ 1030.360023][ T7173] 0 pages HighMem/MovableOnly [ 1030.365951][ T7173] 314802 pages reserved [ 1030.371024][ T7173] 0 pages cma reserved [ 1030.376318][ T7173] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=13178,uid=0 [ 1030.392116][ T7173] Out of memory: Killed process 13178 (syz-executor.2) total-vm:72848kB, anon-rss:16544kB, file-rss:34844kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1030.410168][ T23] oom_reaper: reaped process 13178 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 18:16:37 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:16:37 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{0x0}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:37 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:37 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:37 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1031.517272][ T1890] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1031.543936][ T1890] CPU: 1 PID: 1890 Comm: syz-fuzzer Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1031.553729][ T1890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1031.564382][ T1890] Call Trace: [ 1031.567671][ T1890] dump_stack+0x1b0/0x228 [ 1031.572046][ T1890] ? devkmsg_release+0x127/0x127 [ 1031.577024][ T1890] ? ___ratelimit+0x3bf/0x560 [ 1031.581685][ T1890] ? show_regs_print_info+0x18/0x18 [ 1031.586940][ T1890] ? _raw_spin_lock+0xa1/0x170 [ 1031.591736][ T1890] ? radix_tree_cpu_dead+0x180/0x180 [ 1031.597060][ T1890] dump_header+0xd8/0x730 [ 1031.601534][ T1890] oom_kill_process+0xd7/0x280 [ 1031.606322][ T1890] out_of_memory+0x5b6/0x890 [ 1031.610917][ T1890] ? unregister_oom_notifier+0x20/0x20 [ 1031.616409][ T1890] ? __kasan_check_write+0x14/0x20 [ 1031.621520][ T1890] __alloc_pages_nodemask+0x27e3/0x3010 [ 1031.627089][ T1890] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1031.632644][ T1890] ? page_cache_prev_miss+0x3e0/0x3e0 [ 1031.638028][ T1890] pagecache_get_page+0x4df/0x830 [ 1031.643053][ T1890] ? __count_memcg_events+0x32/0x1b0 [ 1031.648338][ T1890] filemap_fault+0x1457/0x19b0 [ 1031.653104][ T1890] ? generic_file_read_iter+0x2070/0x2070 [ 1031.659812][ T1890] ext4_filemap_fault+0x83/0xa0 [ 1031.664665][ T1890] handle_mm_fault+0x291e/0x41c0 [ 1031.669679][ T1890] ? trace_event_raw_event_rcu_utilization+0x170/0x170 [ 1031.676626][ T1890] ? finish_fault+0x230/0x230 [ 1031.681300][ T1890] ? _copy_from_user+0xa8/0xe0 [ 1031.686062][ T1890] ? vmacache_find+0x21f/0x4d0 [ 1031.691068][ T1890] do_user_addr_fault+0x516/0xb50 [ 1031.696103][ T1890] __do_page_fault+0xa0/0x160 [ 1031.700771][ T1890] do_page_fault+0x74/0x390 [ 1031.705271][ T1890] page_fault+0x2f/0x40 [ 1031.710381][ T1890] RIP: 0033:0x44911b [ 1031.714410][ T1890] Code: 89 0c 24 e8 b7 5c fc ff 48 8b 44 24 58 48 89 04 24 48 8b 44 24 60 48 89 44 24 08 48 8b 44 24 28 48 89 44 24 10 48 8b 54 24 50 <48> 8b 02 ff d0 48 8b 44 24 78 48 89 04 24 e8 e2 5a fc ff 48 8b 44 [ 1031.734964][ T1890] RSP: 002b:000000c42003df60 EFLAGS: 00010202 [ 1031.741022][ T1890] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1031.749095][ T1890] RDX: 00000000009b9910 RSI: 00000000007f5340 RDI: 000000c430ac0380 [ 1031.757815][ T1890] RBP: 000000c42003df58 R08: 0000000000000000 R09: 0000000000000003 [ 1031.765784][ T1890] R10: 000000fdfe1d65e8 R11: 0000000000000001 R12: 000000f0a06f0e33 [ 1031.773836][ T1890] R13: 0000000000000001 R14: 0000000000000013 R15: 0000000000000100 [ 1031.787235][ T1890] Mem-Info: [ 1031.790747][ T1890] active_anon:1438701 inactive_anon:62 isolated_anon:0 [ 1031.790747][ T1890] active_file:278 inactive_file:255 isolated_file:32 [ 1031.790747][ T1890] unevictable:0 dirty:88 writeback:12 unstable:0 [ 1031.790747][ T1890] slab_reclaimable:6700 slab_unreclaimable:86577 [ 1031.790747][ T1890] mapped:52650 shmem:69 pagetables:27371 bounce:0 [ 1031.790747][ T1890] free:10780 free_pcp:162 free_cma:0 [ 1031.829239][ T1890] Node 0 active_anon:5754804kB inactive_anon:248kB active_file:944kB inactive_file:1020kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:210500kB dirty:352kB writeback:48kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1031.854196][ T1890] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1031.880761][ T1890] lowmem_reserve[]: 0 2926 6432 6432 [ 1031.886517][ T1890] DMA32 free:17852kB min:4660kB low:7656kB high:10652kB active_anon:2832088kB inactive_anon:12kB active_file:288kB inactive_file:596kB unevictable:0kB writepending:148kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13152kB pagetables:26812kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1031.925117][ T1890] lowmem_reserve[]: 0 0 3506 3506 [ 1031.936366][ T1890] Normal free:10372kB min:13780kB low:17368kB high:20956kB active_anon:2922476kB inactive_anon:236kB active_file:516kB inactive_file:880kB unevictable:0kB writepending:252kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20672kB pagetables:82672kB bounce:0kB free_pcp:504kB local_pcp:36kB free_cma:0kB [ 1031.978097][ T1890] lowmem_reserve[]: 0 0 0 0 [ 1031.982841][ T1890] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1031.996613][ T1890] DMA32: 229*4kB (UMEH) 69*8kB (UMEH) 38*16kB (UMEH) 23*32kB (UMEH) 48*64kB (UMEH) 29*128kB (UM) 7*256kB (UM) 3*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (E) = 18044kB [ 1032.013604][ T1890] Normal: 664*4kB (UMEH) 348*8kB (UMEH) 132*16kB (UMEH) 19*32kB (ME) 51*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 11424kB [ 1032.028557][ T1890] 318 total pagecache pages [ 1032.036625][ T1890] 0 pages in swap cache [ 1032.058973][ T1890] Swap cache stats: add 0, delete 0, find 0/0 [ 1032.078736][ T1890] Free swap = 0kB [ 1032.082731][ T1890] Total swap = 0kB [ 1032.094063][ T1890] 1965979 pages RAM [ 1032.098336][ T1890] 0 pages HighMem/MovableOnly [ 1032.115816][ T1890] 314802 pages reserved [ 1032.120169][ T1890] 0 pages cma reserved [ 1032.124284][ T1890] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=13281,uid=0 [ 1032.138527][ T1890] Out of memory: Killed process 13281 (syz-executor.2) total-vm:73112kB, anon-rss:16544kB, file-rss:34840kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1032.162941][ T23] oom_reaper: reaped process 13281 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 18:16:39 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:16:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:39 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:39 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:39 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{0x0}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:39 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1032.864511][T13334] udevd invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=-1000 [ 1032.896983][T13334] CPU: 1 PID: 13334 Comm: udevd Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1032.906388][T13334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1032.917656][T13334] Call Trace: [ 1032.921088][T13334] dump_stack+0x1b0/0x228 [ 1032.925430][T13334] ? devkmsg_release+0x127/0x127 [ 1032.930368][T13334] ? ___ratelimit+0x3bf/0x560 [ 1032.935032][T13334] ? show_regs_print_info+0x18/0x18 [ 1032.940209][T13334] ? _raw_spin_lock+0xa1/0x170 [ 1032.944961][T13334] ? radix_tree_cpu_dead+0x180/0x180 [ 1032.950224][T13334] dump_header+0xd8/0x730 [ 1032.954531][T13334] oom_kill_process+0xd7/0x280 [ 1032.959284][T13334] out_of_memory+0x5b6/0x890 [ 1032.963869][T13334] ? unregister_oom_notifier+0x20/0x20 [ 1032.969328][T13334] ? __kasan_check_write+0x14/0x20 [ 1032.974469][T13334] __alloc_pages_nodemask+0x27e3/0x3010 [ 1032.980042][T13334] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1032.985675][T13334] ? memset+0x31/0x40 [ 1032.989829][T13334] ? fsnotify+0x1390/0x1450 [ 1032.994317][T13334] alloc_slab_page+0x3f/0x390 [ 1032.998994][T13334] new_slab+0x3e8/0x430 [ 1033.003172][T13334] ? setup_fault_attr+0x2b0/0x2b0 [ 1033.008328][T13334] ___slab_alloc+0x2e0/0x450 [ 1033.012928][T13334] ? getname_kernel+0x59/0x2f0 [ 1033.017713][T13334] ? __should_failslab+0x11a/0x160 [ 1033.022823][T13334] ? getname_kernel+0x59/0x2f0 [ 1033.027577][T13334] kmem_cache_alloc+0x203/0x2b0 [ 1033.032439][T13334] getname_kernel+0x59/0x2f0 [ 1033.037040][T13334] open_exec+0x17/0x60 [ 1033.041094][T13334] load_elf_binary+0x1abd/0x3720 [ 1033.046029][T13334] ? populate_vma_page_range+0x100/0x100 [ 1033.051797][T13334] ? __kasan_check_write+0x14/0x20 [ 1033.056930][T13334] ? _raw_read_unlock+0x12/0x30 [ 1033.061783][T13334] ? load_script+0x184/0x970 [ 1033.066358][T13334] ? bm_evict_inode+0xd0/0xd0 [ 1033.071040][T13334] ? copy_strings+0x7e4/0x900 [ 1033.075705][T13334] ? load_script+0x970/0x970 [ 1033.080287][T13334] search_binary_handler+0x190/0x5e0 [ 1033.085552][T13334] __do_execve_file+0x12a2/0x1c00 [ 1033.090569][T13334] ? do_execve_file+0x40/0x40 [ 1033.095239][T13334] ? getname_flags+0x214/0x640 [ 1033.100130][T13334] __x64_sys_execve+0x94/0xb0 [ 1033.104912][T13334] do_syscall_64+0xc0/0x100 [ 1033.109415][T13334] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1033.115298][T13334] RIP: 0033:0x7f609f432207 [ 1033.119707][T13334] Code: 77 19 f4 48 89 d7 44 89 c0 0f 05 48 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 f7 d8 64 41 89 01 eb df b8 3b 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 f3 c3 48 8b 15 00 8c 2d 00 f7 d8 64 89 02 [ 1033.139417][T13334] RSP: 002b:00007ffe740de758 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 1033.147829][T13334] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f609f432207 [ 1033.155811][T13334] RDX: 00000000015b51f0 RSI: 00007ffe740de850 RDI: 00007ffe740df860 [ 1033.163953][T13334] RBP: 0000000000625500 R08: 0000000000002655 R09: 0000000000002655 [ 1033.171923][T13334] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000015b51f0 [ 1033.180065][T13334] R13: 0000000000000007 R14: 000000000156d030 R15: 0000000000000005 [ 1033.257887][T13334] Mem-Info: [ 1033.261794][T13334] active_anon:1438518 inactive_anon:60 isolated_anon:0 [ 1033.261794][T13334] active_file:491 inactive_file:615 isolated_file:38 [ 1033.261794][T13334] unevictable:0 dirty:21 writeback:1 unstable:0 [ 1033.261794][T13334] slab_reclaimable:6729 slab_unreclaimable:86445 [ 1033.261794][T13334] mapped:53023 shmem:69 pagetables:27404 bounce:0 [ 1033.261794][T13334] free:10445 free_pcp:333 free_cma:0 [ 1033.332924][T13334] Node 0 active_anon:5754072kB inactive_anon:240kB active_file:1308kB inactive_file:1776kB unevictable:0kB isolated(anon):0kB isolated(file):260kB mapped:211592kB dirty:84kB writeback:4kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1033.358309][T13334] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1033.392641][T13334] lowmem_reserve[]: 0 2926 6432 6432 [ 1033.398018][T13334] DMA32 free:19920kB min:4660kB low:7656kB high:10652kB active_anon:2829504kB inactive_anon:12kB active_file:488kB inactive_file:1032kB unevictable:0kB writepending:8kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13024kB pagetables:26748kB bounce:0kB free_pcp:1040kB local_pcp:556kB free_cma:0kB [ 1033.453611][T13334] lowmem_reserve[]: 0 0 3506 3506 [ 1033.462525][T13334] Normal free:8148kB min:9684kB low:13272kB high:16860kB active_anon:2924240kB inactive_anon:228kB active_file:580kB inactive_file:836kB unevictable:0kB writepending:24kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20704kB pagetables:82864kB bounce:0kB free_pcp:288kB local_pcp:72kB free_cma:0kB [ 1033.511168][T13334] lowmem_reserve[]: 0 0 0 0 [ 1033.515751][T13334] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1033.546333][T13334] DMA32: 475*4kB (UMEH) 203*8kB (UMEH) 86*16kB (UMEH) 39*32kB (UMEH) 43*64kB (UMH) 30*128kB (UM) 8*256kB (UM) 3*512kB (UM) 1*1024kB (M) 0*2048kB 1*4096kB (E) = 21444kB [ 1033.580565][T13334] Normal: 322*4kB (UMEH) 124*8kB (UMEH) 45*16kB (UMEH) 88*32kB (UMEH) 50*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9016kB [ 1033.596034][T13334] 347 total pagecache pages [ 1033.601214][T13334] 0 pages in swap cache [ 1033.605408][T13334] Swap cache stats: add 0, delete 0, find 0/0 [ 1033.612282][T13334] Free swap = 0kB [ 1033.616045][T13334] Total swap = 0kB [ 1033.620575][T13334] 1965979 pages RAM [ 1033.624697][T13334] 0 pages HighMem/MovableOnly [ 1033.630146][T13334] 314802 pages reserved [ 1033.634410][T13334] 0 pages cma reserved [ 1033.638761][T13334] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=640,uid=0 [ 1033.653490][T13334] Out of memory: Killed process 640 (syz-executor.2) total-vm:72980kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:16:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:40 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:16:40 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:40 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:40 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:40 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:41 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xfd) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:41 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1034.841145][T13390] sh invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 1034.866452][T13390] CPU: 0 PID: 13390 Comm: sh Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1034.875594][T13390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.885765][T13390] Call Trace: [ 1034.889060][T13390] dump_stack+0x1b0/0x228 [ 1034.893378][T13390] ? devkmsg_release+0x127/0x127 [ 1034.898313][T13390] ? ___ratelimit+0x3bf/0x560 [ 1034.902999][T13390] ? show_regs_print_info+0x18/0x18 [ 1034.908183][T13390] ? _raw_spin_lock+0xa1/0x170 [ 1034.912943][T13390] ? radix_tree_cpu_dead+0x180/0x180 [ 1034.918226][T13390] dump_header+0xd8/0x730 [ 1034.922556][T13390] oom_kill_process+0xd7/0x280 [ 1034.927296][T13390] out_of_memory+0x5b6/0x890 [ 1034.931869][T13390] ? unregister_oom_notifier+0x20/0x20 [ 1034.937447][T13390] ? __kasan_check_write+0x14/0x20 [ 1034.942549][T13390] __alloc_pages_nodemask+0x27e3/0x3010 [ 1034.948119][T13390] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1034.953660][T13390] ? should_fail+0x18e/0x860 [ 1034.958255][T13390] ? finish_task_switch+0x274/0x560 [ 1034.963455][T13390] ? copy_process+0x59b/0x52d0 [ 1034.968216][T13390] ? kasan_slab_alloc+0xe/0x10 [ 1034.972984][T13390] copy_process+0x5eb/0x52d0 [ 1034.977847][T13390] ? __kasan_check_read+0x11/0x20 [ 1034.983607][T13390] ? preempt_schedule+0xeb/0x110 [ 1034.988647][T13390] ? ___preempt_schedule+0x16/0x20 [ 1034.993763][T13390] ? _raw_spin_unlock+0x1b/0x20 [ 1034.998720][T13390] ? handle_mm_fault+0xb2f/0x41c0 [ 1035.003736][T13390] ? fork_idle+0x290/0x290 [ 1035.008136][T13390] _do_fork+0x185/0x950 [ 1035.012313][T13390] ? dup_mm+0x330/0x330 [ 1035.016464][T13390] ? __down_read+0x240/0x240 [ 1035.021053][T13390] ? vmacache_find+0x21f/0x4d0 [ 1035.025816][T13390] __x64_sys_clone+0x247/0x2b0 [ 1035.030618][T13390] ? __ia32_sys_vfork+0x110/0x110 [ 1035.035630][T13390] do_syscall_64+0xc0/0x100 [ 1035.040137][T13390] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1035.046005][T13390] RIP: 0033:0x7faac5615f46 [ 1035.050413][T13390] Code: Bad RIP value. [ 1035.054464][T13390] RSP: 002b:00007ffc7d3aac70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1035.062862][T13390] RAX: ffffffffffffffda RBX: 00007ffc7d3aac70 RCX: 00007faac5615f46 [ 1035.070818][T13390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1035.078777][T13390] RBP: 00007ffc7d3aacb0 R08: 0000000000000000 R09: 000000000000344e [ 1035.086738][T13390] R10: 00007faac5b0c9d0 R11: 0000000000000246 R12: 0000000000000000 [ 1035.094701][T13390] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1035.110729][T13390] Mem-Info: [ 1035.114373][T13390] active_anon:1438173 inactive_anon:62 isolated_anon:0 [ 1035.114373][T13390] active_file:269 inactive_file:532 isolated_file:91 [ 1035.114373][T13390] unevictable:0 dirty:12 writeback:0 unstable:0 [ 1035.114373][T13390] slab_reclaimable:6762 slab_unreclaimable:86443 [ 1035.114373][T13390] mapped:52842 shmem:69 pagetables:27460 bounce:0 [ 1035.114373][T13390] free:10825 free_pcp:384 free_cma:0 [ 1035.153104][T13390] Node 0 active_anon:5752692kB inactive_anon:248kB active_file:1076kB inactive_file:2128kB unevictable:0kB isolated(anon):0kB isolated(file):364kB mapped:211368kB dirty:48kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1035.179315][T13390] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1035.205378][T13390] lowmem_reserve[]: 0 2926 6432 6432 [ 1035.220656][T13390] DMA32 free:18064kB min:4660kB low:7656kB high:10652kB active_anon:2828444kB inactive_anon:16kB active_file:908kB inactive_file:1536kB unevictable:0kB writepending:40kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13024kB pagetables:26772kB bounce:0kB free_pcp:1764kB local_pcp:788kB free_cma:0kB [ 1035.257948][T13390] lowmem_reserve[]: 0 0 3506 3506 [ 1035.263833][T13390] Normal free:9332kB min:17876kB low:21464kB high:25052kB active_anon:2924248kB inactive_anon:232kB active_file:324kB inactive_file:424kB unevictable:0kB writepending:8kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20672kB pagetables:83068kB bounce:0kB free_pcp:472kB local_pcp:12kB free_cma:0kB [ 1035.293481][T13390] lowmem_reserve[]: 0 0 0 0 [ 1035.298242][T13390] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1035.312875][T13390] DMA32: 482*4kB (UMH) 271*8kB (UMEH) 125*16kB (UMEH) 51*32kB (UMH) 11*64kB (UMH) 46*128kB (M) 11*256kB (UME) 4*512kB (UME) 2*1024kB (ME) 1*2048kB (E) 0*4096kB = 23280kB [ 1035.331182][T13390] Normal: 275*4kB (UMEH) 148*8kB (UMEH) 40*16kB (UMEH) 109*32kB (UMEH) 47*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9420kB [ 1035.347230][T13390] 1257 total pagecache pages [ 1035.352187][T13390] 0 pages in swap cache [ 1035.356373][T13390] Swap cache stats: add 0, delete 0, find 0/0 [ 1035.362742][T13390] Free swap = 0kB [ 1035.366889][T13390] Total swap = 0kB [ 1035.371075][T13390] 1965979 pages RAM [ 1035.375044][T13390] 0 pages HighMem/MovableOnly [ 1035.380058][T13390] 314802 pages reserved [ 1035.384294][T13390] 0 pages cma reserved [ 1035.388534][T13390] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=13392,uid=0 [ 1035.403105][T13390] Out of memory: Killed process 13392 (syz-executor.2) total-vm:72848kB, anon-rss:16544kB, file-rss:35080kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:16:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 18:16:42 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:42 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:42 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xfd) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:42 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:43 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 18:16:43 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, 0x0, 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:43 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xfd) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:43 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 18:16:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:44 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 18:16:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:52 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:52 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20", 0x40}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:52 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1047.888658][ T1884] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1047.899590][ T1884] CPU: 0 PID: 1884 Comm: syz-fuzzer Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1047.909298][ T1884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1047.919337][ T1884] Call Trace: [ 1047.922620][ T1884] dump_stack+0x1b0/0x228 [ 1047.926935][ T1884] ? devkmsg_release+0x127/0x127 [ 1047.931851][ T1884] ? ___ratelimit+0x3bf/0x560 [ 1047.936504][ T1884] ? show_regs_print_info+0x18/0x18 [ 1047.941705][ T1884] ? _raw_spin_lock+0xa1/0x170 [ 1047.946451][ T1884] ? radix_tree_cpu_dead+0x180/0x180 [ 1047.951722][ T1884] dump_header+0xd8/0x730 [ 1047.956030][ T1884] oom_kill_process+0xd7/0x280 [ 1047.960771][ T1884] out_of_memory+0x5b6/0x890 [ 1047.965339][ T1884] ? unregister_oom_notifier+0x20/0x20 [ 1047.970780][ T1884] ? __kasan_check_write+0x14/0x20 [ 1047.975886][ T1884] __alloc_pages_nodemask+0x27e3/0x3010 [ 1047.981455][ T1884] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1047.986984][ T1884] ? page_cache_prev_miss+0x3e0/0x3e0 [ 1047.992357][ T1884] pagecache_get_page+0x4df/0x830 [ 1047.997366][ T1884] ? __count_memcg_events+0x32/0x1b0 [ 1048.002636][ T1884] filemap_fault+0x1457/0x19b0 [ 1048.007397][ T1884] ? generic_file_read_iter+0x2070/0x2070 [ 1048.013122][ T1884] ext4_filemap_fault+0x83/0xa0 [ 1048.018650][ T1884] handle_mm_fault+0x291e/0x41c0 [ 1048.023584][ T1884] ? finish_fault+0x230/0x230 [ 1048.028250][ T1884] ? _copy_from_user+0xa8/0xe0 [ 1048.033006][ T1884] ? __down_read+0x240/0x240 [ 1048.037582][ T1884] ? vmacache_find+0x2ec/0x4d0 [ 1048.042320][ T1884] do_user_addr_fault+0x516/0xb50 [ 1048.047351][ T1884] __do_page_fault+0xa0/0x160 [ 1048.052012][ T1884] do_page_fault+0x74/0x390 [ 1048.056635][ T1884] page_fault+0x2f/0x40 [ 1048.060773][ T1884] RIP: 0033:0x408c0a [ 1048.064651][ T1884] Code: 31 c9 eb e1 48 89 d1 48 89 f8 e9 7c ff ff ff 48 8d 8e 7f fc ff ff 48 c1 e9 07 48 81 f9 f9 00 00 00 73 5e 4c 8d 0d 56 7d 88 00 <42> 0f b6 0c 09 48 83 f9 43 73 4c 4c 8d 0d 64 9e 86 00 41 0f b7 0c [ 1048.084257][ T1884] RSP: 002b:000000c42cbfd5a0 EFLAGS: 00010293 [ 1048.090301][ T1884] RAX: 0000000000865640 RBX: 0000000000865640 RCX: 0000000000000034 [ 1048.098254][ T1884] RDX: 0000000000000080 RSI: 0000000000001dc0 RDI: 0000000000000088 [ 1048.106203][ T1884] RBP: 000000c42cbfd5c8 R08: 0000000000000038 R09: 0000000000c90960 [ 1048.114159][ T1884] R10: 00000000009e8738 R11: 0000000000000006 R12: 0000000000000000 [ 1048.122107][ T1884] R13: 00000000000000fb R14: 00000000000000fb R15: 00000000000000aa [ 1048.130763][ T1884] Mem-Info: [ 1048.135343][ T1884] active_anon:1438169 inactive_anon:60 isolated_anon:0 [ 1048.135343][ T1884] active_file:274 inactive_file:281 isolated_file:27 [ 1048.135343][ T1884] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1048.135343][ T1884] slab_reclaimable:6896 slab_unreclaimable:86889 [ 1048.135343][ T1884] mapped:52682 shmem:69 pagetables:27438 bounce:0 [ 1048.135343][ T1884] free:10685 free_pcp:89 free_cma:0 [ 1048.174235][ T1884] Node 0 active_anon:5752676kB inactive_anon:240kB active_file:840kB inactive_file:920kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:210528kB dirty:0kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1048.197884][ T1884] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1048.224005][ T1884] lowmem_reserve[]: 0 2926 6432 6432 [ 1048.229347][ T1884] DMA32 free:22148kB min:8756kB low:11752kB high:14748kB active_anon:2822744kB inactive_anon:12kB active_file:796kB inactive_file:856kB unevictable:0kB writepending:0kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:12768kB pagetables:26888kB bounce:0kB free_pcp:12kB local_pcp:0kB free_cma:0kB [ 1048.258491][ T1884] lowmem_reserve[]: 0 0 3506 3506 [ 1048.264273][ T1884] Normal free:5512kB min:5588kB low:9176kB high:12764kB active_anon:2929932kB inactive_anon:228kB active_file:300kB inactive_file:508kB unevictable:0kB writepending:0kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20672kB pagetables:82864kB bounce:0kB free_pcp:772kB local_pcp:248kB free_cma:0kB [ 1048.293577][ T1884] lowmem_reserve[]: 0 0 0 0 [ 1048.298100][ T1884] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1048.312931][ T1884] DMA32: 714*4kB (UMEH) 467*8kB (UMEH) 146*16kB (UMEH) 35*32kB (UMEH) 15*64kB (UMEH) 33*128kB (UME) 8*256kB (UM) 3*512kB (UM) 2*1024kB (UM) 1*2048kB (U) 0*4096kB = 22912kB [ 1048.330030][ T1884] Normal: 29*4kB (UMEH) 174*8kB (UMEH) 58*16kB (UMEH) 39*32kB (UME) 25*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5284kB [ 1048.344412][ T1884] 539 total pagecache pages [ 1048.349126][ T1884] 0 pages in swap cache [ 1048.353266][ T1884] Swap cache stats: add 0, delete 0, find 0/0 [ 1048.359555][ T1884] Free swap = 0kB [ 1048.363830][ T1884] Total swap = 0kB [ 1048.367599][ T1884] 1965979 pages RAM [ 1048.371463][ T1884] 0 pages HighMem/MovableOnly [ 1048.376145][ T1884] 314802 pages reserved [ 1048.380952][ T1884] 0 pages cma reserved [ 1048.385074][ T1884] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.1,pid=636,uid=0 [ 1048.399359][ T1884] Out of memory: Killed process 636 (syz-executor.1) total-vm:72848kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1049.094834][T13508] modprobe invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=0, oom_score_adj=0 [ 1049.106575][T13508] CPU: 0 PID: 13508 Comm: modprobe Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1049.116204][T13508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1049.126262][T13508] Call Trace: [ 1049.129562][T13508] dump_stack+0x1b0/0x228 [ 1049.133892][T13508] ? devkmsg_release+0x127/0x127 [ 1049.138828][T13508] ? ___ratelimit+0x3bf/0x560 [ 1049.143529][T13508] ? show_regs_print_info+0x18/0x18 [ 1049.148734][T13508] ? _raw_spin_lock+0xa1/0x170 [ 1049.153586][T13508] ? radix_tree_cpu_dead+0x180/0x180 [ 1049.158879][T13508] dump_header+0xd8/0x730 [ 1049.163216][T13508] oom_kill_process+0xd7/0x280 [ 1049.167981][T13508] out_of_memory+0x5b6/0x890 [ 1049.172576][T13508] ? unregister_oom_notifier+0x20/0x20 [ 1049.178042][T13508] ? __kasan_check_write+0x14/0x20 [ 1049.183159][T13508] __alloc_pages_nodemask+0x27e3/0x3010 [ 1049.188729][T13508] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1049.194286][T13508] ? __kasan_check_write+0x14/0x20 [ 1049.199401][T13508] ? up_write+0xa1/0x190 [ 1049.203649][T13508] __pmd_alloc+0x40/0x210 [ 1049.207980][T13508] move_page_tables+0x106f/0x1160 [ 1049.213023][T13508] setup_arg_pages+0x741/0x9a0 [ 1049.217788][T13508] ? copy_strings+0x900/0x900 [ 1049.222459][T13508] ? selinux_bprm_committing_creds+0x920/0x920 [ 1049.228622][T13508] ? __kasan_check_write+0x14/0x20 [ 1049.233728][T13508] ? commit_creds+0x682/0x980 [ 1049.238404][T13508] ? __kasan_check_read+0x11/0x20 [ 1049.243423][T13508] ? randomize_stack_top+0xb1/0x100 [ 1049.248662][T13508] load_elf_binary+0x959/0x3720 [ 1049.253540][T13508] ? __kasan_check_write+0x14/0x20 [ 1049.258648][T13508] ? _raw_read_unlock+0x12/0x30 [ 1049.263499][T13508] ? load_elf_binary+0x801/0x3720 [ 1049.268525][T13508] ? load_script+0x184/0x970 [ 1049.273117][T13508] ? bm_evict_inode+0xd0/0xd0 [ 1049.277793][T13508] ? preempt_schedule_irq+0xc7/0x110 [ 1049.283080][T13508] ? load_script+0x970/0x970 [ 1049.287689][T13508] ? inode_permission2+0xce/0x600 [ 1049.292726][T13508] search_binary_handler+0x190/0x5e0 [ 1049.298285][T13508] __do_execve_file+0x12a2/0x1c00 [ 1049.303329][T13508] ? do_execve_file+0x40/0x40 [ 1049.308118][T13508] ? getname_kernel+0x59/0x2f0 [ 1049.312881][T13508] ? getname_kernel+0x15d/0x2f0 [ 1049.318197][T13508] do_execve+0x33/0x40 [ 1049.322278][T13508] call_usermodehelper_exec_async+0x318/0x4c0 [ 1049.328339][T13508] ? proc_cap_handler+0x500/0x500 [ 1049.333372][T13508] ret_from_fork+0x1f/0x30 [ 1049.388106][T13508] Mem-Info: [ 1049.391379][T13508] active_anon:1439039 inactive_anon:62 isolated_anon:0 [ 1049.391379][T13508] active_file:203 inactive_file:181 isolated_file:32 [ 1049.391379][T13508] unevictable:0 dirty:28 writeback:3 unstable:0 [ 1049.391379][T13508] slab_reclaimable:6909 slab_unreclaimable:86917 [ 1049.391379][T13508] mapped:52524 shmem:69 pagetables:27486 bounce:0 [ 1049.391379][T13508] free:9950 free_pcp:106 free_cma:0 [ 1049.429569][T13508] Node 0 active_anon:5756156kB inactive_anon:248kB active_file:704kB inactive_file:624kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:209996kB dirty:112kB writeback:12kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1049.454664][T13508] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1049.488854][T13508] lowmem_reserve[]: 0 2926 6432 6432 [ 1049.504388][T13508] DMA32 free:20644kB min:4660kB low:7656kB high:10652kB active_anon:2823144kB inactive_anon:20kB active_file:728kB inactive_file:264kB unevictable:0kB writepending:216kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13184kB pagetables:27072kB bounce:0kB free_pcp:144kB local_pcp:140kB free_cma:0kB [ 1049.534458][T13508] lowmem_reserve[]: 0 0 3506 3506 [ 1049.540014][T13508] Normal free:4260kB min:5588kB low:9176kB high:12764kB active_anon:2932816kB inactive_anon:228kB active_file:12kB inactive_file:28kB unevictable:0kB writepending:8kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20704kB pagetables:82872kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1049.569016][T13508] lowmem_reserve[]: 0 0 0 0 [ 1049.573923][T13508] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1049.587507][T13508] DMA32: 350*4kB (MEH) 211*8kB (UMEH) 95*16kB (UMEH) 14*32kB (UEH) 26*64kB (UMEH) 60*128kB (ME) 7*256kB (M) 3*512kB (UM) 1*1024kB (M) 1*2048kB (U) 0*4096kB = 20800kB [ 1049.604982][T13508] Normal: 108*4kB (UME) 110*8kB (UME) 46*16kB (UME) 19*32kB (UME) 25*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4256kB [ 1049.619630][T13508] 252 total pagecache pages [ 1049.624609][T13508] 0 pages in swap cache [ 1049.628935][T13508] Swap cache stats: add 0, delete 0, find 0/0 [ 1049.635125][T13508] Free swap = 0kB [ 1049.660271][T13508] Total swap = 0kB [ 1049.668570][T13508] 1965979 pages RAM [ 1049.677059][T13508] 0 pages HighMem/MovableOnly [ 1049.687577][T13508] 314802 pages reserved [ 1049.697298][T13508] 0 pages cma reserved [ 1049.701662][T13508] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.1,pid=601,uid=0 [ 1049.716085][T13508] Out of memory: Killed process 601 (syz-executor.1) total-vm:72848kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:16:55 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x17b) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:16:55 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 18:16:57 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:57 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:57 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 18:16:57 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20", 0x40}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:57 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1050.569391][T13555] syz-executor.4 invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=1000 [ 1050.583928][T13555] CPU: 0 PID: 13555 Comm: syz-executor.4 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1050.594087][T13555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1050.604140][T13555] Call Trace: [ 1050.607546][T13555] dump_stack+0x1b0/0x228 [ 1050.612041][T13555] ? devkmsg_release+0x127/0x127 [ 1050.616962][T13555] ? ___ratelimit+0x3bf/0x560 [ 1050.621651][T13555] ? show_regs_print_info+0x18/0x18 [ 1050.626852][T13555] ? _raw_spin_lock+0xa1/0x170 [ 1050.631598][T13555] ? radix_tree_cpu_dead+0x180/0x180 [ 1050.636883][T13555] dump_header+0xd8/0x730 [ 1050.641198][T13555] oom_kill_process+0xd7/0x280 [ 1050.645966][T13555] out_of_memory+0x5b6/0x890 [ 1050.650571][T13555] ? unregister_oom_notifier+0x20/0x20 [ 1050.656012][T13555] ? __kasan_check_write+0x14/0x20 [ 1050.661121][T13555] __alloc_pages_nodemask+0x27e3/0x3010 [ 1050.666661][T13555] ? kmem_cache_alloc+0x120/0x2b0 [ 1050.671700][T13555] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1050.677230][T13555] ? up_read+0x10/0x10 [ 1050.681295][T13555] ? anon_vma_interval_tree_insert+0x31d/0x330 [ 1050.687432][T13555] ? __anon_vma_prepare+0x3b5/0x4a0 [ 1050.692626][T13555] handle_mm_fault+0x1723/0x41c0 [ 1050.697573][T13555] ? find_vma+0x160/0x160 [ 1050.701890][T13555] ? get_unmapped_area+0x31c/0x380 [ 1050.707003][T13555] ? up_write+0xa1/0x190 [ 1050.711228][T13555] ? finish_fault+0x230/0x230 [ 1050.715929][T13555] ? vmacache_update+0xb7/0x120 [ 1050.720768][T13555] do_user_addr_fault+0x516/0xb50 [ 1050.725790][T13555] __do_page_fault+0xa0/0x160 [ 1050.730520][T13555] do_page_fault+0x74/0x390 [ 1050.735022][T13555] page_fault+0x2f/0x40 [ 1050.739167][T13555] RIP: 0033:0x412b8f [ 1050.743049][T13555] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 1050.762641][T13555] RSP: 002b:00007ffdb2f7bfe0 EFLAGS: 00010206 [ 1050.768695][T13555] RAX: 00007f5481c42000 RBX: 0000000000020000 RCX: 000000000045b3ea [ 1050.776656][T13555] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 1050.784679][T13555] RBP: 00007ffdb2f7c0c0 R08: ffffffffffffffff R09: 0000000000000000 [ 1050.792651][T13555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdb2f7c1b0 [ 1050.800615][T13555] R13: 00007f5481c62700 R14: 0000000000000001 R15: 000000000075bfd4 [ 1050.810407][T13555] Mem-Info: [ 1050.813729][T13555] active_anon:1439039 inactive_anon:59 isolated_anon:0 [ 1050.813729][T13555] active_file:349 inactive_file:307 isolated_file:44 [ 1050.813729][T13555] unevictable:0 dirty:59 writeback:25 unstable:0 [ 1050.813729][T13555] slab_reclaimable:6921 slab_unreclaimable:86592 [ 1050.813729][T13555] mapped:52845 shmem:69 pagetables:27538 bounce:0 [ 1050.813729][T13555] free:9434 free_pcp:385 free_cma:0 [ 1050.903610][T13555] Node 0 active_anon:5757856kB inactive_anon:236kB active_file:1008kB inactive_file:1040kB unevictable:0kB isolated(anon):0kB isolated(file):196kB mapped:210980kB dirty:236kB writeback:100kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1050.948919][T13555] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1050.977194][T13555] lowmem_reserve[]: 0 2926 6432 6432 [ 1050.983164][T13555] DMA32 free:18244kB min:4660kB low:7656kB high:10652kB active_anon:2824828kB inactive_anon:8kB active_file:968kB inactive_file:1388kB unevictable:0kB writepending:172kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13152kB pagetables:27284kB bounce:0kB free_pcp:712kB local_pcp:12kB free_cma:0kB [ 1051.048901][T13555] lowmem_reserve[]: 0 0 3506 3506 [ 1051.088896][T13555] Normal free:5104kB min:5588kB low:9176kB high:12764kB active_anon:2930944kB inactive_anon:228kB active_file:8kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20704kB pagetables:82876kB bounce:0kB free_pcp:1564kB local_pcp:1316kB free_cma:0kB [ 1051.149332][T13555] lowmem_reserve[]: 0 0 0 0 [ 1051.154629][T13555] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1051.177623][T13555] DMA32: 509*4kB (UMH) 583*8kB (UMH) 175*16kB (UMEH) 75*32kB (UMEH) 26*64kB (MEH) 70*128kB (UME) 8*256kB (UM) 2*512kB (M) 1*1024kB (M) 1*2048kB (U) 0*4096kB = 28668kB [ 1051.195548][T13555] Normal: 195*4kB (UME) 101*8kB (UME) 38*16kB (UME) 34*32kB (UMEH) 25*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4884kB [ 1051.211348][T13555] 1424 total pagecache pages [ 1051.216844][T13555] 0 pages in swap cache [ 1051.222093][T13555] Swap cache stats: add 0, delete 0, find 0/0 [ 1051.230206][T13555] Free swap = 0kB [ 1051.234682][T13555] Total swap = 0kB [ 1051.280567][T13555] 1965979 pages RAM [ 1051.293822][T13555] 0 pages HighMem/MovableOnly [ 1051.316405][T13555] 314802 pages reserved 18:16:58 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:58 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x17b) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1051.335101][T13555] 0 pages cma reserved [ 1051.352221][T13555] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=32449,uid=0 18:16:58 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:16:58 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20", 0x40}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1051.378922][T13555] Out of memory: Killed process 32449 (syz-executor.2) total-vm:72980kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:16:58 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:00 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) dup(r1) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:00 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x17b) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:00 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:00 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a556", 0x60}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) dup(r1) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:04 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r2, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) dup(r1) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1060.687199][ T22] audit: type=1400 audit(1580667427.643:62): avc: denied { map } for pid=13633 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:17:05 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1064.940155][ T3674] kworker/u4:4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 1064.952450][ T3674] CPU: 0 PID: 3674 Comm: kworker/u4:4 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1064.962350][ T3674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.972537][ T3674] Workqueue: events_unbound call_usermodehelper_exec_work [ 1064.979626][ T3674] Call Trace: [ 1064.982900][ T3674] dump_stack+0x1b0/0x228 [ 1064.987330][ T3674] ? devkmsg_release+0x127/0x127 [ 1064.992374][ T3674] ? ___ratelimit+0x3bf/0x560 [ 1064.997046][ T3674] ? show_regs_print_info+0x18/0x18 [ 1065.002243][ T3674] ? _raw_spin_lock+0xa1/0x170 [ 1065.007133][ T3674] ? radix_tree_cpu_dead+0x180/0x180 [ 1065.012465][ T3674] dump_header+0xd8/0x730 [ 1065.016791][ T3674] oom_kill_process+0xd7/0x280 [ 1065.021548][ T3674] out_of_memory+0x5b6/0x890 [ 1065.026156][ T3674] ? unregister_oom_notifier+0x20/0x20 [ 1065.031615][ T3674] ? __kasan_check_write+0x14/0x20 [ 1065.036740][ T3674] __alloc_pages_nodemask+0x27e3/0x3010 [ 1065.042316][ T3674] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1065.047869][ T3674] ? should_fail+0x18e/0x860 [ 1065.052468][ T3674] ? wb_calc_thresh+0x240/0x240 [ 1065.057321][ T3674] ? copy_process+0x59b/0x52d0 [ 1065.062089][ T3674] ? copy_process+0x59b/0x52d0 [ 1065.066855][ T3674] ? kasan_slab_alloc+0xe/0x10 [ 1065.071643][ T3674] copy_process+0x5eb/0x52d0 [ 1065.076237][ T3674] ? wb_io_lists_depopulated+0x170/0x170 [ 1065.081868][ T3674] ? set_worker_desc+0x149/0x1b0 [ 1065.086911][ T3674] ? fork_idle+0x290/0x290 [ 1065.091500][ T3674] ? cpumask_next+0x23/0x30 [ 1065.096009][ T3674] ? __kasan_check_read+0x11/0x20 [ 1065.101035][ T3674] ? wb_workfn+0xf3e/0x13a0 [ 1065.105548][ T3674] _do_fork+0x185/0x950 [ 1065.109751][ T3674] ? __rcu_read_lock+0x50/0x50 [ 1065.114533][ T3674] ? dup_mm+0x330/0x330 [ 1065.118829][ T3674] kernel_thread+0x149/0x1b0 [ 1065.123427][ T3674] ? proc_cap_handler+0x500/0x500 [ 1065.128463][ T3674] ? legacy_clone_args_valid+0x50/0x50 [ 1065.133942][ T3674] ? dequeue_task_fair+0x68a/0x1050 [ 1065.139149][ T3674] ? proc_cap_handler+0x500/0x500 [ 1065.144292][ T3674] ? _raw_spin_unlock_irq+0x9/0x20 [ 1065.149407][ T3674] ? kernel_sigaction+0x795/0x7c0 [ 1065.154487][ T3674] ? finish_task_switch+0x274/0x560 [ 1065.159739][ T3674] call_usermodehelper_exec_work+0xe0/0x350 [ 1065.165657][ T3674] ? call_usermodehelper_setup+0x230/0x230 [ 1065.171563][ T3674] ? __kasan_check_read+0x11/0x20 [ 1065.177289][ T3674] ? read_word_at_a_time+0x12/0x20 [ 1065.182424][ T3674] ? strscpy+0xbc/0x270 [ 1065.186600][ T3674] process_one_work+0x9d8/0x1030 [ 1065.191560][ T3674] worker_thread+0xbbc/0x1610 [ 1065.196281][ T3674] kthread+0x31a/0x340 [ 1065.200351][ T3674] ? process_one_work+0x1030/0x1030 [ 1065.205691][ T3674] ? kthread_destroy_worker+0x270/0x270 [ 1065.211251][ T3674] ret_from_fork+0x1f/0x30 [ 1065.262976][ T3674] Mem-Info: [ 1065.266166][ T3674] active_anon:1438849 inactive_anon:62 isolated_anon:0 [ 1065.266166][ T3674] active_file:60 inactive_file:311 isolated_file:39 [ 1065.266166][ T3674] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1065.266166][ T3674] slab_reclaimable:7090 slab_unreclaimable:87282 [ 1065.266166][ T3674] mapped:52455 shmem:69 pagetables:27458 bounce:0 [ 1065.266166][ T3674] free:9658 free_pcp:0 free_cma:0 [ 1065.338902][ T3674] Node 0 active_anon:5755396kB inactive_anon:248kB active_file:496kB inactive_file:552kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:209820kB dirty:0kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1065.387567][ T3674] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1065.413993][ T3674] lowmem_reserve[]: 0 2926 6432 6432 [ 1065.419630][ T3674] DMA32 free:19044kB min:8756kB low:11752kB high:14748kB active_anon:2822584kB inactive_anon:20kB active_file:8kB inactive_file:324kB unevictable:0kB writepending:0kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:12960kB pagetables:26748kB bounce:0kB free_pcp:292kB local_pcp:0kB free_cma:0kB [ 1065.448993][ T3674] lowmem_reserve[]: 0 0 3506 3506 [ 1065.454301][ T3674] Normal free:4692kB min:5588kB low:9176kB high:12764kB active_anon:2931920kB inactive_anon:228kB active_file:104kB inactive_file:12kB unevictable:0kB writepending:0kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20736kB pagetables:83084kB bounce:0kB free_pcp:60kB local_pcp:0kB free_cma:0kB [ 1065.484012][ T3674] lowmem_reserve[]: 0 0 0 0 [ 1065.490368][ T3674] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1065.528877][ T3674] DMA32: 872*4kB (UM) 766*8kB (UM) 128*16kB (ME) 50*32kB (UMEH) 8*64kB (UMH) 49*128kB (UM) 8*256kB (UMH) 3*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 24656kB [ 1065.547080][ T3674] Normal: 376*4kB (UME) 69*8kB (UME) 29*16kB (UME) 45*32kB (UMEH) 23*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5432kB [ 1065.561308][ T3674] 465 total pagecache pages [ 1065.565811][ T3674] 0 pages in swap cache [ 1065.570029][ T3674] Swap cache stats: add 0, delete 0, find 0/0 [ 1065.576107][ T3674] Free swap = 0kB [ 1065.579968][ T3674] Total swap = 0kB [ 1065.583689][ T3674] 1965979 pages RAM [ 1065.587727][ T3674] 0 pages HighMem/MovableOnly [ 1065.592446][ T3674] 314802 pages reserved [ 1065.596592][ T3674] 0 pages cma reserved [ 1065.600690][ T3674] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.3,pid=13606,uid=0 [ 1065.614929][ T3674] Out of memory: Killed process 13606 (syz-executor.3) total-vm:72980kB, anon-rss:16560kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1065.640037][ T23] oom_reaper: reaped process 13606 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 18:17:12 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) socket(0x11, 0x80a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:12 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a556", 0x60}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:13 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1ba) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:13 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r2, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:13 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) socket(0x11, 0x80a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1066.680549][ T3674] kworker/u4:4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 1066.698168][ T3674] CPU: 1 PID: 3674 Comm: kworker/u4:4 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1066.708124][ T3674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.718487][ T3674] Workqueue: events_unbound call_usermodehelper_exec_work [ 1066.725604][ T3674] Call Trace: [ 1066.728894][ T3674] dump_stack+0x1b0/0x228 [ 1066.733245][ T3674] ? devkmsg_release+0x127/0x127 [ 1066.738275][ T3674] ? ___ratelimit+0x3bf/0x560 [ 1066.742979][ T3674] ? show_regs_print_info+0x18/0x18 [ 1066.748169][ T3674] ? _raw_spin_lock+0xa1/0x170 [ 1066.752962][ T3674] ? radix_tree_cpu_dead+0x180/0x180 [ 1066.758240][ T3674] dump_header+0xd8/0x730 [ 1066.762592][ T3674] oom_kill_process+0xd7/0x280 [ 1066.767352][ T3674] out_of_memory+0x5b6/0x890 [ 1066.771938][ T3674] ? unregister_oom_notifier+0x20/0x20 [ 1066.777415][ T3674] ? __kasan_check_write+0x14/0x20 [ 1066.782547][ T3674] __alloc_pages_nodemask+0x27e3/0x3010 [ 1066.788094][ T3674] ? _raw_spin_lock+0xa1/0x170 [ 1066.792956][ T3674] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1066.798596][ T3674] ? should_fail+0x18e/0x860 [ 1066.803236][ T3674] ? _raw_spin_unlock+0x9/0x20 [ 1066.808025][ T3674] ? copy_process+0x59b/0x52d0 [ 1066.812860][ T3674] ? copy_process+0x59b/0x52d0 [ 1066.817632][ T3674] ? kasan_slab_alloc+0xe/0x10 [ 1066.822406][ T3674] copy_process+0x5eb/0x52d0 [ 1066.827030][ T3674] ? arch_stack_walk+0xb4/0xe0 [ 1066.831824][ T3674] ? stack_trace_save+0x111/0x1e0 [ 1066.836843][ T3674] ? stack_trace_snprint+0x150/0x150 [ 1066.842691][ T3674] ? wait_for_common+0x486/0x570 [ 1066.847622][ T3674] ? fork_idle+0x290/0x290 [ 1066.852028][ T3674] ? fsnotify_connector_destroy_workfn+0x8a/0xb0 [ 1066.858345][ T3674] ? __kasan_slab_free+0x1e2/0x220 [ 1066.863442][ T3674] ? __kasan_slab_free+0x168/0x220 [ 1066.868542][ T3674] ? kasan_slab_free+0xe/0x10 [ 1066.873237][ T3674] ? fsnotify_connector_destroy_workfn+0x8a/0xb0 [ 1066.879713][ T3674] ? process_one_work+0x9d8/0x1030 [ 1066.884817][ T3674] _do_fork+0x185/0x950 [ 1066.888976][ T3674] ? dup_mm+0x330/0x330 [ 1066.893155][ T3674] ? __update_load_avg_se+0x5a4/0x990 [ 1066.898526][ T3674] kernel_thread+0x149/0x1b0 [ 1066.903107][ T3674] ? proc_cap_handler+0x500/0x500 [ 1066.908323][ T3674] ? legacy_clone_args_valid+0x50/0x50 [ 1066.913792][ T3674] ? switch_mm_irqs_off+0x6a1/0x9d0 [ 1066.918989][ T3674] ? proc_cap_handler+0x500/0x500 [ 1066.924013][ T3674] ? _raw_spin_unlock_irq+0x9/0x20 [ 1066.929903][ T3674] ? kernel_sigaction+0x795/0x7c0 [ 1066.934918][ T3674] ? finish_task_switch+0x274/0x560 [ 1066.940126][ T3674] call_usermodehelper_exec_work+0xe0/0x350 [ 1066.946009][ T3674] ? call_usermodehelper_setup+0x230/0x230 [ 1066.951878][ T3674] ? __kasan_check_read+0x11/0x20 [ 1066.956992][ T3674] ? read_word_at_a_time+0x12/0x20 [ 1066.962088][ T3674] ? strscpy+0xbc/0x270 [ 1066.966341][ T3674] process_one_work+0x9d8/0x1030 [ 1066.971386][ T3674] worker_thread+0xbbc/0x1610 [ 1066.976052][ T3674] kthread+0x31a/0x340 [ 1066.980144][ T3674] ? process_one_work+0x1030/0x1030 [ 1066.985352][ T3674] ? kthread_destroy_worker+0x270/0x270 [ 1066.990894][ T3674] ret_from_fork+0x1f/0x30 [ 1066.996321][ T3674] Mem-Info: [ 1067.004319][ T3674] active_anon:1437739 inactive_anon:62 isolated_anon:0 [ 1067.004319][ T3674] active_file:36 inactive_file:242 isolated_file:55 [ 1067.004319][ T3674] unevictable:0 dirty:12 writeback:0 unstable:0 [ 1067.004319][ T3674] slab_reclaimable:7121 slab_unreclaimable:86997 [ 1067.004319][ T3674] mapped:52274 shmem:69 pagetables:27581 bounce:0 [ 1067.004319][ T3674] free:10880 free_pcp:172 free_cma:0 [ 1067.046490][ T3674] Node 0 active_anon:5750948kB inactive_anon:248kB active_file:104kB inactive_file:1080kB unevictable:0kB isolated(anon):0kB isolated(file):248kB mapped:209112kB dirty:56kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1067.070527][ T3674] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1067.104128][ T3674] lowmem_reserve[]: 0 2926 6432 6432 [ 1067.109517][ T3674] DMA32 free:19900kB min:4660kB low:7656kB high:10652kB active_anon:2822356kB inactive_anon:20kB active_file:20kB inactive_file:268kB unevictable:0kB writepending:32kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13120kB pagetables:26956kB bounce:0kB free_pcp:620kB local_pcp:264kB free_cma:0kB [ 1067.153569][ T3674] lowmem_reserve[]: 0 0 3506 3506 [ 1067.158674][ T3674] Normal free:7896kB min:17876kB low:21464kB high:25052kB active_anon:2928592kB inactive_anon:228kB active_file:84kB inactive_file:200kB unevictable:0kB writepending:24kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20768kB pagetables:83368kB bounce:0kB free_pcp:732kB local_pcp:0kB free_cma:0kB [ 1067.188268][ T3674] lowmem_reserve[]: 0 0 0 0 [ 1067.192943][ T3674] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1067.206612][ T3674] DMA32: 119*4kB (UMEH) 48*8kB (UMH) 20*16kB (UMEH) 36*32kB (UMEH) 5*64kB (MEH) 31*128kB (ME) 8*256kB (UMH) 4*512kB (UM) 4*1024kB (UM) 0*2048kB 1*4096kB (M) = 18908kB [ 1067.224459][ T3674] Normal: 236*4kB (ME) 218*8kB (ME) 70*16kB (ME) 86*32kB (ME) 14*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7456kB [ 1067.248987][ T3674] 588 total pagecache pages [ 1067.253520][ T3674] 0 pages in swap cache [ 1067.257691][ T3674] Swap cache stats: add 0, delete 0, find 0/0 [ 1067.272482][ T3674] Free swap = 0kB [ 1067.276268][ T3674] Total swap = 0kB [ 1067.287002][ T3674] 1965979 pages RAM [ 1067.291035][ T3674] 0 pages HighMem/MovableOnly [ 1067.295714][ T3674] 314802 pages reserved [ 1067.300118][ T3674] 0 pages cma reserved [ 1067.304470][ T3674] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=31869,uid=0 [ 1067.319009][ T3674] Out of memory: Killed process 31869 (syz-executor.2) total-vm:72980kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:17:14 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r2, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:14 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x10c) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:14 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:14 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a556", 0x60}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:14 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1ba) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:15 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:15 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1ba) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:16 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4", 0x70}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) socket(0x11, 0x80a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:18 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x10c) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:18 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:18 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:18 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4", 0x70}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1072.254465][T13783] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1072.267532][T13783] selinux_nlmsg_perm: 274 callbacks suppressed [ 1072.267541][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1072.290088][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1072.304089][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1072.318454][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1072.332206][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1074.262603][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1074.282312][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1074.320462][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1074.334389][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1074.479062][T13783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13783 comm=syz-executor.4 [ 1074.697694][T10887] udevd invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=-1000 [ 1074.734380][T10887] CPU: 0 PID: 10887 Comm: udevd Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1074.743781][T10887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.753840][T10887] Call Trace: [ 1074.757151][T10887] dump_stack+0x1b0/0x228 [ 1074.761492][T10887] ? devkmsg_release+0x127/0x127 [ 1074.766428][T10887] ? ___ratelimit+0x3bf/0x560 [ 1074.771167][T10887] ? show_regs_print_info+0x18/0x18 [ 1074.776366][T10887] ? _raw_spin_lock+0xa1/0x170 [ 1074.781123][T10887] ? radix_tree_cpu_dead+0x180/0x180 [ 1074.786445][T10887] dump_header+0xd8/0x730 [ 1074.790761][T10887] oom_kill_process+0xd7/0x280 [ 1074.795513][T10887] out_of_memory+0x5b6/0x890 [ 1074.800080][T10887] ? unregister_oom_notifier+0x20/0x20 [ 1074.805532][T10887] ? __kasan_check_write+0x14/0x20 [ 1074.810637][T10887] __alloc_pages_nodemask+0x27e3/0x3010 [ 1074.816180][T10887] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1074.821730][T10887] ? should_fail+0x18e/0x860 [ 1074.826304][T10887] ? __do_pipe_flags+0x4c/0x210 [ 1074.831248][T10887] ? copy_process+0x59b/0x52d0 [ 1074.835990][T10887] ? copy_process+0x59b/0x52d0 [ 1074.840749][T10887] ? kasan_slab_alloc+0xe/0x10 [ 1074.845534][T10887] copy_process+0x5eb/0x52d0 [ 1074.850104][T10887] ? setup_fault_attr+0x2b0/0x2b0 [ 1074.855248][T10887] ? __should_failslab+0x11a/0x160 [ 1074.860355][T10887] ? expand_files+0xd1/0x970 [ 1074.864917][T10887] ? kasan_slab_alloc+0xe/0x10 [ 1074.869679][T10887] ? kmem_cache_alloc+0x120/0x2b0 [ 1074.874850][T10887] ? fork_idle+0x290/0x290 [ 1074.879279][T10887] ? selinux_file_alloc_security+0x1d/0x120 [ 1074.885242][T10887] ? __kasan_check_write+0x14/0x20 [ 1074.890443][T10887] ? _raw_spin_lock+0xa1/0x170 [ 1074.895198][T10887] ? _raw_spin_trylock_bh+0x190/0x190 [ 1074.900582][T10887] ? blk_crypto_evict_key+0x110/0x110 [ 1074.905944][T10887] _do_fork+0x185/0x950 [ 1074.910099][T10887] ? _raw_spin_unlock+0x9/0x20 [ 1074.914839][T10887] ? __alloc_fd+0x4e6/0x590 [ 1074.919323][T10887] ? dup_mm+0x330/0x330 [ 1074.923594][T10887] ? __fd_install+0x119/0x250 [ 1074.928260][T10887] __x64_sys_clone+0x247/0x2b0 [ 1074.933041][T10887] ? __ia32_sys_vfork+0x110/0x110 [ 1074.938055][T10887] ? syscall_return_slowpath+0x6f/0x500 [ 1074.943704][T10887] do_syscall_64+0xc0/0x100 [ 1074.948203][T10887] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1074.954080][T10887] RIP: 0033:0x7f609f431f46 [ 1074.958502][T10887] Code: Bad RIP value. [ 1074.962551][T10887] RSP: 002b:00007ffe740de6f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1074.970977][T10887] RAX: ffffffffffffffda RBX: 00007ffe740de6f0 RCX: 00007f609f431f46 [ 1074.978949][T10887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1074.986914][T10887] RBP: 00007ffe740de750 R08: 0000000000002a87 R09: 0000000000002a87 [ 1074.994972][T10887] R10: 00007f609fd4ea70 R11: 0000000000000246 R12: 0000000000000000 [ 1075.002960][T10887] R13: 00007ffe740de710 R14: 0000000000000005 R15: 0000000000000005 [ 1075.015340][T10887] Mem-Info: [ 1075.018532][T10887] active_anon:1437239 inactive_anon:59 isolated_anon:0 [ 1075.018532][T10887] active_file:66 inactive_file:380 isolated_file:0 [ 1075.018532][T10887] unevictable:0 dirty:0 writeback:1 unstable:0 [ 1075.018532][T10887] slab_reclaimable:7331 slab_unreclaimable:87393 [ 1075.018532][T10887] mapped:52376 shmem:69 pagetables:27593 bounce:0 [ 1075.018532][T10887] free:10696 free_pcp:108 free_cma:0 [ 1075.061695][T10887] Node 0 active_anon:5748456kB inactive_anon:236kB active_file:964kB inactive_file:2848kB unevictable:0kB isolated(anon):0kB isolated(file):372kB mapped:211704kB dirty:0kB writeback:4kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1075.086792][T10887] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1075.121396][T10887] lowmem_reserve[]: 0 2926 6432 6432 [ 1075.126753][T10887] DMA32 free:18312kB min:4660kB low:7656kB high:10652kB active_anon:2823124kB inactive_anon:8kB active_file:12kB inactive_file:2056kB unevictable:0kB writepending:4kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:12896kB pagetables:27264kB bounce:0kB free_pcp:1132kB local_pcp:428kB free_cma:0kB [ 1075.158587][T10887] lowmem_reserve[]: 0 0 3506 3506 [ 1075.163883][T10887] Normal free:6332kB min:9684kB low:13272kB high:16860kB active_anon:2925832kB inactive_anon:228kB active_file:612kB inactive_file:836kB unevictable:0kB writepending:0kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20768kB pagetables:83108kB bounce:0kB free_pcp:368kB local_pcp:0kB free_cma:0kB [ 1075.196049][T10887] lowmem_reserve[]: 0 0 0 0 [ 1075.200725][T10887] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1075.224954][T10887] DMA32: 170*4kB (UMH) 52*8kB (UMH) 17*16kB (UME) 56*32kB (UMEH) 6*64kB (UH) 1*128kB (E) 9*256kB (UMEH) 5*512kB (UME) 5*1024kB (UME) 1*2048kB (E) 1*4096kB (M) = 19800kB [ 1075.246123][T10887] Normal: 237*4kB (UME) 76*8kB (UME) 68*16kB (UME) 137*32kB (UME) 16*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8052kB [ 1075.260582][T10887] 805 total pagecache pages [ 1075.265102][T10887] 0 pages in swap cache [ 1075.269381][T10887] Swap cache stats: add 0, delete 0, find 0/0 [ 1075.275437][T10887] Free swap = 0kB [ 1075.281610][T10887] Total swap = 0kB [ 1075.285343][T10887] 1965979 pages RAM [ 1075.289475][T10887] 0 pages HighMem/MovableOnly [ 1075.294145][T10887] 314802 pages reserved [ 1075.298454][T10887] 0 pages cma reserved [ 1075.302654][T10887] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.4,pid=31654,uid=0 [ 1075.318939][T10887] Out of memory: Killed process 31654 (syz-executor.4) total-vm:72848kB, anon-rss:16548kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 18:17:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:22 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:22 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1da) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:22 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe9"], 0x10c) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:22 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:22 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a556", 0x60}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:22 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1076.078969][T13825] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1077.818146][T13838] modprobe invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=0 [ 1077.837283][T13838] CPU: 1 PID: 13838 Comm: modprobe Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1077.847086][T13838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.857251][T13838] Call Trace: [ 1077.860558][T13838] dump_stack+0x1b0/0x228 [ 1077.864905][T13838] ? devkmsg_release+0x127/0x127 [ 1077.870622][T13838] ? ___ratelimit+0x3bf/0x560 [ 1077.875917][T13838] ? show_regs_print_info+0x18/0x18 [ 1077.881563][T13838] ? _raw_spin_lock+0xa1/0x170 [ 1077.886370][T13838] ? radix_tree_cpu_dead+0x180/0x180 [ 1077.891696][T13838] dump_header+0xd8/0x730 [ 1077.896050][T13838] oom_kill_process+0xd7/0x280 [ 1077.900933][T13838] out_of_memory+0x5b6/0x890 [ 1077.905529][T13838] ? unregister_oom_notifier+0x20/0x20 [ 1077.910993][T13838] ? __kasan_check_write+0x14/0x20 [ 1077.916107][T13838] __alloc_pages_nodemask+0x27e3/0x3010 [ 1077.921651][T13838] ? kmem_cache_alloc+0x120/0x2b0 [ 1077.926690][T13838] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1077.932389][T13838] ? up_read+0x10/0x10 [ 1077.936462][T13838] ? anon_vma_interval_tree_insert+0x31d/0x330 [ 1077.942624][T13838] ? __anon_vma_prepare+0x3b5/0x4a0 [ 1077.947942][T13838] wp_page_copy+0x199/0x10e0 [ 1077.952555][T13838] ? xas_find+0x617/0x6f0 [ 1077.957849][T13838] ? add_mm_rss_vec+0x270/0x270 [ 1077.962864][T13838] ? filemap_map_pages+0x10aa/0x1120 [ 1077.968360][T13838] ? vm_normal_page+0x1e1/0x1f0 [ 1077.973214][T13838] do_wp_page+0x48d/0x14b0 [ 1077.977748][T13838] ? _raw_spin_lock+0xa1/0x170 [ 1077.982503][T13838] ? do_swap_page+0x1530/0x1530 [ 1077.987359][T13838] handle_mm_fault+0x13c0/0x41c0 [ 1077.992302][T13838] ? finish_fault+0x230/0x230 [ 1077.997225][T13838] ? preempt_schedule_irq+0xc7/0x110 [ 1078.002641][T13838] ? preempt_schedule_notrace+0x110/0x110 [ 1078.008365][T13838] ? __down_read+0x240/0x240 [ 1078.012971][T13838] ? vmacache_find+0x21f/0x4d0 [ 1078.017750][T13838] do_user_addr_fault+0x516/0xb50 [ 1078.022872][T13838] __do_page_fault+0xa0/0x160 [ 1078.027729][T13838] do_page_fault+0x74/0x390 [ 1078.032282][T13838] page_fault+0x2f/0x40 [ 1078.036419][T13838] RIP: 0033:0x7f2beec9a1fb [ 1078.040847][T13838] Code: 83 c4 18 ff e0 48 89 7c 24 08 e8 00 ff ff ff 48 8b 05 81 8d 36 00 48 8b 7c 24 08 eb e2 90 90 31 c0 53 0f a2 81 f9 6e 74 65 6c <89> 05 c3 cf 36 00 0f 85 d1 00 00 00 81 fb 47 65 6e 75 74 51 90 45 [ 1078.061453][T13838] RSP: 002b:00007ffe8dc5d6f8 EFLAGS: 00010246 [ 1078.067525][T13838] RAX: 000000000000000d RBX: 00000000756e6547 RCX: 000000006c65746e [ 1078.075524][T13838] RDX: 0000000049656e69 RSI: 0000000000000025 RDI: 0000000000000002 [ 1078.083510][T13838] RBP: 00007ffe8dc5d7f0 R08: 0000000000000001 R09: 000000000000002f [ 1078.091760][T13838] R10: 00007f2beec99af0 R11: 00007ffe8dc5d540 R12: 00007f2beec7b000 [ 1078.099723][T13838] R13: 00007f2bef002038 R14: 00007f2beec99ac0 R15: 00007f2bef002d98 [ 1078.141214][T13838] Mem-Info: [ 1078.145488][T13838] active_anon:1436857 inactive_anon:60 isolated_anon:0 [ 1078.145488][T13838] active_file:291 inactive_file:377 isolated_file:11 [ 1078.145488][T13838] unevictable:0 dirty:2 writeback:17 unstable:0 [ 1078.145488][T13838] slab_reclaimable:7417 slab_unreclaimable:87398 [ 1078.145488][T13838] mapped:52788 shmem:69 pagetables:27648 bounce:0 [ 1078.145488][T13838] free:10588 free_pcp:280 free_cma:0 [ 1078.184603][T13838] Node 0 active_anon:5747428kB inactive_anon:240kB active_file:952kB inactive_file:1408kB unevictable:0kB isolated(anon):0kB isolated(file):44kB mapped:210852kB dirty:8kB writeback:68kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1078.209548][T13838] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1078.236746][T13838] lowmem_reserve[]: 0 2926 6432 6432 [ 1078.244065][T13838] DMA32 free:19452kB min:4660kB low:7656kB high:10652kB active_anon:2822264kB inactive_anon:12kB active_file:668kB inactive_file:872kB unevictable:0kB writepending:40kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:12928kB pagetables:27416kB bounce:0kB free_pcp:1288kB local_pcp:688kB free_cma:0kB [ 1078.276799][T13838] lowmem_reserve[]: 0 0 3506 3506 [ 1078.300287][T13838] Normal free:6704kB min:9684kB low:13272kB high:16860kB active_anon:2925164kB inactive_anon:228kB active_file:352kB inactive_file:576kB unevictable:0kB writepending:36kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20768kB pagetables:83176kB bounce:0kB free_pcp:892kB local_pcp:312kB free_cma:0kB [ 1078.330372][T13838] lowmem_reserve[]: 0 0 0 0 [ 1078.335004][T13838] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1078.358871][T13838] DMA32: 10*4kB (UMH) 74*8kB (MEH) 12*16kB (UM) 35*32kB (UM) 17*64kB (UEH) 1*128kB (U) 6*256kB (UMH) 5*512kB (UME) 5*1024kB (UME) 1*2048kB (E) 1*4096kB (M) = 18520kB [ 1078.386737][T13838] Normal: 599*4kB (UMH) 40*8kB (UME) 25*16kB (UME) 118*32kB (UME) 10*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7532kB [ 1078.433094][T13838] 867 total pagecache pages [ 1078.437823][T13838] 0 pages in swap cache [ 1078.442390][T13838] Swap cache stats: add 0, delete 0, find 0/0 [ 1078.449277][T13838] Free swap = 0kB [ 1078.453319][T13838] Total swap = 0kB [ 1078.457777][T13838] 1965979 pages RAM [ 1078.462380][T13838] 0 pages HighMem/MovableOnly [ 1078.467438][T13838] 314802 pages reserved [ 1078.472260][T13838] 0 pages cma reserved [ 1078.476563][T13838] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.1,pid=31514,uid=0 [ 1078.492166][T13838] Out of memory: Killed process 31514 (syz-executor.1) total-vm:72848kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:17:26 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:26 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a2"], 0x192) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:26 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a556", 0x60}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1079.979025][T13851] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1079.989432][T13851] selinux_nlmsg_perm: 84 callbacks suppressed [ 1079.989438][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.010137][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.024396][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.038971][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.053979][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.067636][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.081692][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.095190][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.108903][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 [ 1080.122921][T13851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13851 comm=syz-executor.4 18:17:27 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1da) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1080.744749][T10887] udevd invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=-1000 [ 1080.757071][T10887] CPU: 0 PID: 10887 Comm: udevd Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1080.766977][T10887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.777124][T10887] Call Trace: [ 1080.780636][T10887] dump_stack+0x1b0/0x228 [ 1080.785278][T10887] ? devkmsg_release+0x127/0x127 [ 1080.790219][T10887] ? ___ratelimit+0x3bf/0x560 [ 1080.795589][T10887] ? show_regs_print_info+0x18/0x18 [ 1080.801004][T10887] ? _raw_spin_lock+0xa1/0x170 [ 1080.805927][T10887] ? radix_tree_cpu_dead+0x180/0x180 [ 1080.811249][T10887] dump_header+0xd8/0x730 [ 1080.815737][T10887] oom_kill_process+0xd7/0x280 [ 1080.820669][T10887] out_of_memory+0x5b6/0x890 [ 1080.825269][T10887] ? unregister_oom_notifier+0x20/0x20 [ 1080.830880][T10887] ? __kasan_check_write+0x14/0x20 [ 1080.836251][T10887] __alloc_pages_nodemask+0x27e3/0x3010 [ 1080.842375][T10887] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1080.848022][T10887] ? should_fail+0x18e/0x860 [ 1080.852911][T10887] ? __do_pipe_flags+0x4c/0x210 [ 1080.858007][T10887] ? do_pipe2+0x8f/0x2b0 [ 1080.862267][T10887] ? copy_process+0x59b/0x52d0 [ 1080.867126][T10887] ? kasan_slab_alloc+0xe/0x10 [ 1080.872027][T10887] copy_process+0x5eb/0x52d0 [ 1080.876926][T10887] ? security_file_alloc+0x36/0x210 [ 1080.882140][T10887] ? setup_fault_attr+0x2b0/0x2b0 [ 1080.887976][T10887] ? __should_failslab+0x11a/0x160 [ 1080.893463][T10887] ? expand_files+0xd1/0x970 [ 1080.898476][T10887] ? kasan_slab_alloc+0xe/0x10 [ 1080.903484][T10887] ? kmem_cache_alloc+0x120/0x2b0 [ 1080.909041][T10887] ? fork_idle+0x290/0x290 [ 1080.913469][T10887] ? selinux_file_alloc_security+0x1d/0x120 [ 1080.919555][T10887] ? __kasan_check_write+0x14/0x20 [ 1080.924864][T10887] ? _raw_spin_lock+0xa1/0x170 [ 1080.929975][T10887] ? _raw_spin_trylock_bh+0x190/0x190 [ 1080.935367][T10887] ? blk_crypto_evict_key+0x110/0x110 [ 1080.941370][T10887] _do_fork+0x185/0x950 [ 1080.945534][T10887] ? _raw_spin_unlock+0x9/0x20 [ 1080.950452][T10887] ? __alloc_fd+0x4e6/0x590 [ 1080.954964][T10887] ? dup_mm+0x330/0x330 [ 1080.959127][T10887] ? __fd_install+0x119/0x250 [ 1080.963898][T10887] __x64_sys_clone+0x247/0x2b0 [ 1080.969735][T10887] ? __ia32_sys_vfork+0x110/0x110 [ 1080.974981][T10887] ? syscall_return_slowpath+0x6f/0x500 [ 1080.980532][T10887] do_syscall_64+0xc0/0x100 [ 1080.985229][T10887] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1080.991389][T10887] RIP: 0033:0x7f609f431f46 [ 1080.996421][T10887] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 1081.016660][T10887] RSP: 002b:00007ffe740de6f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1081.026425][T10887] RAX: ffffffffffffffda RBX: 00007ffe740de6f0 RCX: 00007f609f431f46 [ 1081.034971][T10887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1081.043098][T10887] RBP: 00007ffe740de750 R08: 0000000000002a87 R09: 0000000000002a87 [ 1081.051422][T10887] R10: 00007f609fd4ea70 R11: 0000000000000246 R12: 0000000000000000 [ 1081.059389][T10887] R13: 00007ffe740de710 R14: 0000000000000005 R15: 0000000000000005 [ 1081.116666][T10887] Mem-Info: [ 1081.120211][T10887] active_anon:1436512 inactive_anon:60 isolated_anon:0 [ 1081.120211][T10887] active_file:344 inactive_file:345 isolated_file:32 [ 1081.120211][T10887] unevictable:0 dirty:32 writeback:0 unstable:0 [ 1081.120211][T10887] slab_reclaimable:7473 slab_unreclaimable:87553 [ 1081.120211][T10887] mapped:52744 shmem:69 pagetables:27668 bounce:0 [ 1081.120211][T10887] free:10313 free_pcp:191 free_cma:0 [ 1081.161996][T10887] Node 0 active_anon:5746048kB inactive_anon:240kB active_file:816kB inactive_file:888kB unevictable:0kB isolated(anon):0kB isolated(file):8kB mapped:210176kB dirty:128kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1081.187939][T10887] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1081.223110][T10887] lowmem_reserve[]: 0 2926 6432 6432 [ 1081.252579][T10887] DMA32 free:27736kB min:4660kB low:7656kB high:10652kB active_anon:2812932kB inactive_anon:12kB active_file:604kB inactive_file:288kB unevictable:0kB writepending:76kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13120kB pagetables:27504kB bounce:0kB free_pcp:2660kB local_pcp:1420kB free_cma:0kB [ 1081.290232][T10887] lowmem_reserve[]: 0 0 3506 3506 [ 1081.295980][T10887] Normal free:10300kB min:5588kB low:9176kB high:12764kB active_anon:2917932kB inactive_anon:228kB active_file:828kB inactive_file:912kB unevictable:0kB writepending:56kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20832kB pagetables:83168kB bounce:0kB free_pcp:1856kB local_pcp:752kB free_cma:0kB [ 1081.327483][T10887] lowmem_reserve[]: 0 0 0 0 [ 1081.333915][T10887] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1081.355838][T10887] DMA32: 697*4kB (UMEH) 379*8kB (UMEH) 148*16kB (UME) 70*32kB (UME) 28*64kB (UMEH) 4*128kB (UME) 7*256kB (UMEH) 4*512kB (UM) 5*1024kB (UME) 1*2048kB (E) 1*4096kB (M) = 27836kB [ 1081.399176][T10887] Normal: 904*4kB (UMH) 100*8kB (UMEH) 28*16kB (ME) 105*32kB (UMEH) 28*64kB (UMH) 6*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 10784kB [ 1081.424324][T10887] 912 total pagecache pages [ 1081.433870][T10887] 0 pages in swap cache [ 1081.439515][T10887] Swap cache stats: add 0, delete 0, find 0/0 [ 1081.447072][T10887] Free swap = 0kB [ 1081.451655][T10887] Total swap = 0kB [ 1081.456113][T10887] 1965979 pages RAM [ 1081.460874][T10887] 0 pages HighMem/MovableOnly [ 1081.466488][T10887] 314802 pages reserved [ 1081.489110][T10887] 0 pages cma reserved [ 1081.493377][T10887] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.4,pid=31379,uid=0 [ 1081.519018][T10887] Out of memory: Killed process 31379 (syz-executor.4) total-vm:72848kB, anon-rss:16548kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 [ 1081.540838][ T23] oom_reaper: reaped process 31379 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 18:17:28 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a556", 0x60}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:28 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:28 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x192) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:28 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1082.008149][T13886] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1082.466726][ T1934] syz-executor.5 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1082.509242][ T1934] CPU: 1 PID: 1934 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1082.519991][ T1934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.530327][ T1934] Call Trace: [ 1082.533688][ T1934] dump_stack+0x1b0/0x228 [ 1082.538108][ T1934] ? devkmsg_release+0x127/0x127 [ 1082.543033][ T1934] ? ___ratelimit+0x3bf/0x560 [ 1082.547877][ T1934] ? show_regs_print_info+0x18/0x18 [ 1082.553676][ T1934] ? _raw_spin_lock+0xa1/0x170 [ 1082.558560][ T1934] ? radix_tree_cpu_dead+0x180/0x180 [ 1082.564185][ T1934] dump_header+0xd8/0x730 [ 1082.568712][ T1934] oom_kill_process+0xd7/0x280 [ 1082.573556][ T1934] out_of_memory+0x5b6/0x890 [ 1082.578139][ T1934] ? unregister_oom_notifier+0x20/0x20 [ 1082.583868][ T1934] ? __kasan_check_write+0x14/0x20 [ 1082.589341][ T1934] __alloc_pages_nodemask+0x27e3/0x3010 [ 1082.595148][ T1934] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1082.601835][ T1934] ? page_cache_prev_miss+0x3e0/0x3e0 [ 1082.607670][ T1934] pagecache_get_page+0x4df/0x830 [ 1082.613100][ T1934] ? __count_memcg_events+0x32/0x1b0 [ 1082.619198][ T1934] filemap_fault+0x1457/0x19b0 [ 1082.625528][ T1934] ? generic_file_read_iter+0x2070/0x2070 [ 1082.634609][ T1934] ext4_filemap_fault+0x83/0xa0 [ 1082.639910][ T1934] handle_mm_fault+0x291e/0x41c0 [ 1082.645346][ T1934] ? finish_fault+0x230/0x230 [ 1082.650986][ T1934] ? switch_mm_irqs_off+0x875/0x9d0 [ 1082.657937][ T1934] ? vmacache_find+0x21f/0x4d0 [ 1082.663643][ T1934] do_user_addr_fault+0x516/0xb50 [ 1082.669200][ T1934] __do_page_fault+0xa0/0x160 [ 1082.673892][ T1934] do_page_fault+0x74/0x390 [ 1082.678838][ T1934] page_fault+0x2f/0x40 [ 1082.684147][ T1934] RIP: 0033:0x40efce [ 1082.688401][ T1934] Code: 89 c6 48 8b 05 cb 36 66 00 4c 89 f3 44 8b 20 eb 48 0f 1f 00 bf e8 03 00 00 e8 5e c3 04 00 e8 b9 36 ff ff 48 8b 15 aa 36 66 00 <8b> 0a 48 89 c2 41 39 cc 48 0f 45 d8 4c 29 f2 48 81 fa 87 13 00 00 [ 1082.708412][ T1934] RSP: 002b:00007ffd348200e0 EFLAGS: 00010206 [ 1082.714903][ T1934] RAX: 000000000010842b RBX: 0000000000107a6d RCX: 0000000000108290 [ 1082.723153][ T1934] RDX: 0000001b2c020000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1082.731685][ T1934] RBP: 000000000000109e R08: 0000000000000001 R09: 000000000246d940 [ 1082.740895][ T1934] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 1082.749181][ T1934] R13: 00007ffd34820110 R14: 00000000001079b7 R15: 00007ffd34820120 [ 1082.796208][ T1934] Mem-Info: [ 1082.801499][ T1934] active_anon:1432728 inactive_anon:62 isolated_anon:0 [ 1082.801499][ T1934] active_file:414 inactive_file:914 isolated_file:81 [ 1082.801499][ T1934] unevictable:0 dirty:62 writeback:0 unstable:0 [ 1082.801499][ T1934] slab_reclaimable:7510 slab_unreclaimable:87499 [ 1082.801499][ T1934] mapped:53113 shmem:69 pagetables:27696 bounce:0 [ 1082.801499][ T1934] free:13177 free_pcp:635 free_cma:0 [ 1082.841900][ T1934] Node 0 active_anon:5730912kB inactive_anon:248kB active_file:1956kB inactive_file:5252kB unevictable:0kB isolated(anon):0kB isolated(file):452kB mapped:213552kB dirty:248kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1082.890138][ T1934] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1082.919505][ T1934] lowmem_reserve[]: 0 2926 6432 6432 [ 1082.932306][ T1934] DMA32 free:35496kB min:4660kB low:7656kB high:10652kB active_anon:2801080kB inactive_anon:16kB active_file:1052kB inactive_file:4184kB unevictable:0kB writepending:84kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13056kB pagetables:27700kB bounce:0kB free_pcp:1256kB local_pcp:652kB free_cma:0kB [ 1082.967676][ T1934] lowmem_reserve[]: 0 0 3506 3506 [ 1082.973505][ T1934] Normal free:16428kB min:9684kB low:13272kB high:16860kB active_anon:2913024kB inactive_anon:232kB active_file:992kB inactive_file:300kB unevictable:0kB writepending:164kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20768kB pagetables:83084kB bounce:0kB free_pcp:2308kB local_pcp:924kB free_cma:0kB [ 1083.010431][ T1934] lowmem_reserve[]: 0 0 0 0 [ 1083.016068][ T1934] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1083.031789][ T1934] DMA32: 1077*4kB (MEH) 457*8kB (UMH) 286*16kB (UM) 147*32kB (UMEH) 37*64kB (UMEH) 6*128kB (UME) 6*256kB (UMH) 4*512kB (UM) 5*1024kB (UME) 1*2048kB (E) 1*4096kB (M) = 35228kB [ 1083.051546][ T1934] Normal: 508*4kB (MEH) 183*8kB (MH) 104*16kB (MH) 171*32kB (MEH) 39*64kB (MEH) 8*128kB (MEH) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 14152kB [ 1083.067889][ T1934] 2826 total pagecache pages [ 1083.073395][ T1934] 0 pages in swap cache [ 1083.077956][ T1934] Swap cache stats: add 0, delete 0, find 0/0 [ 1083.084708][ T1934] Free swap = 0kB [ 1083.089413][ T1934] Total swap = 0kB [ 1083.093856][ T1934] 1965979 pages RAM [ 1083.098132][ T1934] 0 pages HighMem/MovableOnly [ 1083.103702][ T1934] 314802 pages reserved [ 1083.109011][ T1934] 0 pages cma reserved [ 1083.113268][ T1934] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=31282,uid=0 18:17:30 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1da) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea91368", 0x68}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x192) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1083.128440][ T1934] Out of memory: Killed process 31282 (syz-executor.2) total-vm:72980kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1083.148782][ T23] oom_reaper: reaped process 31282 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1083.238141][T13914] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:30 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf92"], 0x1ea) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:30 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:31 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea91368", 0x68}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:31 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1ea) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:31 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:31 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:31 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:31 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1ea) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1084.853943][T13993] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1085.566142][T13993] selinux_nlmsg_perm: 227 callbacks suppressed [ 1085.566150][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.587861][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.608278][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.622173][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.638998][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.652230][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.666290][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.679495][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.692915][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 [ 1085.706139][T13993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13993 comm=syz-executor.4 18:17:33 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:33 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:33 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91"], 0x1f2) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:33 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea91368", 0x68}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:33 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1086.304003][T14026] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:34 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f2) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:34 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f7) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:34 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:34 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:34 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1", 0x6c}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:34 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f2) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1087.501743][T14059] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:36 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1", 0x6c}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:36 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:36 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f7) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:36 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:36 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483"], 0x1f6) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:36 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f6) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1089.380074][T14103] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1089.945776][T14118] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=1000 [ 1090.004908][T14118] CPU: 1 PID: 14118 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1090.019231][T14118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.030715][T14118] Call Trace: [ 1090.034107][T14118] dump_stack+0x1b0/0x228 [ 1090.038614][T14118] ? devkmsg_release+0x127/0x127 [ 1090.043677][T14118] ? ___ratelimit+0x3bf/0x560 [ 1090.048369][T14118] ? show_regs_print_info+0x18/0x18 [ 1090.053581][T14118] ? _raw_spin_lock+0xa1/0x170 [ 1090.058349][T14118] ? radix_tree_cpu_dead+0x180/0x180 [ 1090.063647][T14118] dump_header+0xd8/0x730 [ 1090.067983][T14118] oom_kill_process+0xd7/0x280 [ 1090.072938][T14118] out_of_memory+0x5b6/0x890 [ 1090.077621][T14118] ? unregister_oom_notifier+0x20/0x20 [ 1090.083130][T14118] ? __kasan_check_write+0x14/0x20 [ 1090.088348][T14118] __alloc_pages_nodemask+0x27e3/0x3010 [ 1090.093906][T14118] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1090.099450][T14118] ? should_fail+0x18e/0x860 [ 1090.104044][T14118] ? __rcu_read_lock+0x50/0x50 [ 1090.108809][T14118] ? copy_process+0x59b/0x52d0 [ 1090.113847][T14118] ? kasan_slab_alloc+0xe/0x10 [ 1090.118608][T14118] copy_process+0x5eb/0x52d0 [ 1090.123196][T14118] ? __kasan_check_write+0x14/0x20 [ 1090.128311][T14118] ? _raw_spin_lock+0xa1/0x170 [ 1090.133065][T14118] ? kcov_ioctl+0x1b5/0x7f0 [ 1090.137773][T14118] ? fork_idle+0x290/0x290 [ 1090.142185][T14118] ? kcov_remote_reset+0xc0/0xc0 [ 1090.147121][T14118] ? do_vfs_ioctl+0x757/0x1700 [ 1090.151871][T14118] _do_fork+0x185/0x950 [ 1090.156287][T14118] ? ioctl_preallocate+0x240/0x240 [ 1090.161402][T14118] ? dup_mm+0x330/0x330 [ 1090.165678][T14118] ? _copy_to_user+0x92/0xb0 [ 1090.170629][T14118] ? put_timespec64+0x106/0x150 [ 1090.175600][T14118] ? ktime_get_raw+0x130/0x130 [ 1090.180464][T14118] __x64_sys_clone+0x247/0x2b0 [ 1090.185234][T14118] ? __ia32_sys_vfork+0x110/0x110 [ 1090.190376][T14118] ? syscall_return_slowpath+0x6f/0x500 [ 1090.195914][T14118] ? __x64_sys_futex+0xe5/0x100 [ 1090.200764][T14118] do_syscall_64+0xc0/0x100 [ 1090.205412][T14118] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1090.211301][T14118] RIP: 0033:0x45b399 [ 1090.215187][T14118] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.234784][T14118] RSP: 002b:00007f075ddfcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1090.243190][T14118] RAX: ffffffffffffffda RBX: 00007f075ddfd6d4 RCX: 000000000045b399 [ 1090.251157][T14118] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000100 [ 1090.259246][T14118] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1090.267348][T14118] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1090.275438][T14118] R13: 0000000000000070 R14: 00000000004c1c24 R15: 000000000075bf2c [ 1090.336695][T14118] Mem-Info: [ 1090.346510][T14118] active_anon:1432981 inactive_anon:62 isolated_anon:0 [ 1090.346510][T14118] active_file:177 inactive_file:803 isolated_file:42 [ 1090.346510][T14118] unevictable:0 dirty:3 writeback:0 unstable:0 [ 1090.346510][T14118] slab_reclaimable:7596 slab_unreclaimable:87592 [ 1090.346510][T14118] mapped:52756 shmem:69 pagetables:27866 bounce:0 [ 1090.346510][T14118] free:13022 free_pcp:950 free_cma:0 [ 1090.412508][T14118] Node 0 active_anon:5731924kB inactive_anon:248kB active_file:1208kB inactive_file:6312kB unevictable:0kB isolated(anon):0kB isolated(file):160kB mapped:213524kB dirty:212kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1090.441632][T14118] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1090.472653][T14118] lowmem_reserve[]: 0 2926 6432 6432 18:17:37 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:37 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1", 0x6c}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1090.508083][T14118] DMA32 free:22116kB min:4660kB low:7656kB high:10652kB active_anon:2811508kB inactive_anon:12kB active_file:2608kB inactive_file:4476kB unevictable:0kB writepending:8kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13088kB pagetables:28548kB bounce:0kB free_pcp:1584kB local_pcp:1012kB free_cma:0kB [ 1090.539897][T14118] lowmem_reserve[]: 0 0 3506 3506 18:17:37 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f7) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:37 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f6) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:37 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1090.570123][T14118] Normal free:8328kB min:5588kB low:9176kB high:12764kB active_anon:2919792kB inactive_anon:236kB active_file:220kB inactive_file:2880kB unevictable:0kB writepending:4kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20896kB pagetables:82916kB bounce:0kB free_pcp:2324kB local_pcp:1008kB free_cma:0kB [ 1090.607506][T14118] lowmem_reserve[]: 0 0 0 0 [ 1090.637177][T14118] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1090.655935][T14118] DMA32: 1058*4kB (UMH) 227*8kB (UMH) 95*16kB (UME) 48*32kB (UMEH) 30*64kB (UMEH) 13*128kB (UME) 8*256kB (UMEH) 4*512kB (ME) 3*1024kB (M) 1*2048kB (E) 1*4096kB (M) = 26000kB [ 1090.694694][T14118] Normal: 765*4kB (UMH) 221*8kB (UMH) 33*16kB (UMH) 58*32kB (MH) 30*64kB (UMH) 6*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9900kB [ 1090.721908][T14140] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1090.736290][T14140] selinux_nlmsg_perm: 242 callbacks suppressed [ 1090.736300][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1090.758138][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1090.772502][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1090.786849][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1091.145718][T14118] 1308 total pagecache pages [ 1091.157806][T14118] 0 pages in swap cache [ 1091.167318][T14118] Swap cache stats: add 0, delete 0, find 0/0 [ 1091.179975][T14118] Free swap = 0kB [ 1091.185945][T14118] Total swap = 0kB [ 1091.208544][T14118] 1965979 pages RAM [ 1091.220867][T14118] 0 pages HighMem/MovableOnly [ 1091.231669][T14118] 314802 pages reserved [ 1091.236866][T14118] 0 pages cma reserved [ 1091.242791][T14118] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.3,pid=13942,uid=0 [ 1091.287975][T14118] Out of memory: Killed process 13942 (syz-executor.3) total-vm:72980kB, anon-rss:16560kB, file-rss:34840kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1091.502973][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1091.515901][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1091.528965][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1091.541859][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1091.560294][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 [ 1091.573946][T14140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14140 comm=syz-executor.4 18:17:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:38 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:38 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f8) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:38 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:38 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:38 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x208) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r0 = socket(0x11, 0x80a, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 1091.800858][T14177] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:39 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae646349"], 0x208) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r0 = socket(0x11, 0x80a, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 18:17:39 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r0 = socket(0x11, 0x80a, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 18:17:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:40 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:40 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f8) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:40 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:40 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x208) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:40 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a57caf"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1093.503708][T14252] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:41 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:41 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1", 0x6c}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:41 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x210) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:41 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f8) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:41 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1094.519033][T14290] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:42 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:42 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x210) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:42 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:42 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:42 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1", 0x6c}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1095.972426][T14305] syz-executor.2 invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=1000 [ 1095.985496][T14305] CPU: 1 PID: 14305 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1095.996401][T14305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.006470][T14305] Call Trace: [ 1096.009765][T14305] dump_stack+0x1b0/0x228 [ 1096.014095][T14305] ? devkmsg_release+0x127/0x127 [ 1096.019031][T14305] ? ___ratelimit+0x3bf/0x560 [ 1096.023716][T14305] ? show_regs_print_info+0x18/0x18 [ 1096.028895][T14305] ? _raw_spin_lock+0xa1/0x170 [ 1096.033639][T14305] ? radix_tree_cpu_dead+0x180/0x180 [ 1096.039041][T14305] dump_header+0xd8/0x730 [ 1096.043351][T14305] oom_kill_process+0xd7/0x280 [ 1096.048220][T14305] out_of_memory+0x5b6/0x890 [ 1096.052812][T14305] ? unregister_oom_notifier+0x20/0x20 [ 1096.058259][T14305] ? __kasan_check_write+0x14/0x20 [ 1096.063349][T14305] __alloc_pages_nodemask+0x27e3/0x3010 [ 1096.068905][T14305] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1096.074473][T14305] ? __kasan_check_read+0x11/0x20 [ 1096.079501][T14305] ? __lru_cache_add+0x1ae/0x200 [ 1096.084437][T14305] wp_page_copy+0x199/0x10e0 [ 1096.089025][T14305] ? add_mm_rss_vec+0x270/0x270 [ 1096.093856][T14305] ? vm_normal_page+0x1e1/0x1f0 [ 1096.098721][T14305] do_wp_page+0x48d/0x14b0 [ 1096.103140][T14305] ? _raw_spin_lock+0xa1/0x170 [ 1096.107888][T14305] ? do_swap_page+0x1530/0x1530 [ 1096.112755][T14305] handle_mm_fault+0x13c0/0x41c0 [ 1096.117677][T14305] ? reweight_entity+0x87/0xb10 [ 1096.122511][T14305] ? __perf_event_task_sched_in+0x4ed/0x550 [ 1096.128393][T14305] ? finish_fault+0x230/0x230 [ 1096.133082][T14305] ? perf_pmu_sched_task+0x370/0x370 [ 1096.138354][T14305] ? vmacache_find+0x494/0x4d0 [ 1096.143118][T14305] do_user_addr_fault+0x516/0xb50 [ 1096.148304][T14305] __do_page_fault+0xa0/0x160 [ 1096.152979][T14305] do_page_fault+0x74/0x390 [ 1096.157599][T14305] page_fault+0x2f/0x40 [ 1096.161759][T14305] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x30 [ 1096.168362][T14305] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 1096.187959][T14305] RSP: 0018:ffff88801c907828 EFLAGS: 00010206 [ 1096.194019][T14305] RAX: ffffffff81f69101 RBX: 00000000202ad500 RCX: 0000000000000500 [ 1096.203352][T14305] RDX: 0000000000001000 RSI: ffff88801a68db00 RDI: 00000000202ad000 [ 1096.211597][T14305] RBP: ffff88801c907858 R08: dffffc0000000000 R09: ffffed10034d1c00 [ 1096.219568][T14305] R10: 0000000000000000 R11: 0000000000000000 R12: 00007ffffffff000 [ 1096.227662][T14305] R13: 0000000000001000 R14: ffff88801a68d000 R15: 00000000202ac500 [ 1096.236019][T14305] ? copyout+0x41/0xb0 [ 1096.240340][T14305] ? copyout+0x92/0xb0 [ 1096.244535][T14305] copy_page_to_iter+0x3ab/0xbe0 [ 1096.249495][T14305] pipe_to_user+0xb3/0x160 [ 1096.253910][T14305] __splice_from_pipe+0x2b7/0x850 [ 1096.258923][T14305] ? user_page_pipe_buf_steal+0xc0/0xc0 [ 1096.264473][T14305] do_vmsplice+0x240/0xe70 [ 1096.268877][T14305] ? futex_exit_release+0xd0/0xd0 [ 1096.273887][T14305] ? __kasan_check_write+0x14/0x20 [ 1096.279092][T14305] ? _raw_spin_lock+0xa1/0x170 [ 1096.283850][T14305] ? _raw_spin_trylock_bh+0x190/0x190 [ 1096.289243][T14305] ? write_pipe_buf+0x1d0/0x1d0 [ 1096.294094][T14305] ? check_stack_object+0x124/0x140 [ 1096.299288][T14305] ? __kasan_check_write+0x14/0x20 [ 1096.304511][T14305] ? _copy_from_user+0xa8/0xe0 [ 1096.309262][T14305] ? rw_copy_check_uvector+0x2a5/0x300 [ 1096.314998][T14305] ? import_iovec+0x171/0x340 [ 1096.319666][T14305] ? dup_iter+0x130/0x130 [ 1096.323985][T14305] ? call_rcu+0xb/0x10 [ 1096.328055][T14305] ? __fdget+0x17c/0x200 [ 1096.332305][T14305] __se_sys_vmsplice+0x1cc/0x2c0 [ 1096.337226][T14305] ? _raw_spin_trylock_bh+0x190/0x190 [ 1096.342597][T14305] ? __x64_sys_vmsplice+0xb0/0xb0 [ 1096.347618][T14305] ? __kasan_check_read+0x11/0x20 [ 1096.353091][T14305] ? _copy_to_user+0x92/0xb0 [ 1096.357781][T14305] ? put_timespec64+0x106/0x150 [ 1096.362613][T14305] ? ktime_get_raw+0x130/0x130 [ 1096.367380][T14305] ? get_timespec64+0x1c0/0x1c0 [ 1096.372219][T14305] ? __kasan_check_read+0x11/0x20 [ 1096.377222][T14305] ? __ia32_sys_clock_settime+0x230/0x230 [ 1096.383054][T14305] __x64_sys_vmsplice+0x9b/0xb0 [ 1096.387903][T14305] do_syscall_64+0xc0/0x100 [ 1096.392387][T14305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1096.398381][T14305] RIP: 0033:0x45b399 [ 1096.402279][T14305] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1096.421954][T14305] RSP: 002b:00007fc7c45bcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 1096.430363][T14305] RAX: ffffffffffffffda RBX: 00007fc7c45bd6d4 RCX: 000000000045b399 [ 1096.438504][T14305] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005 [ 1096.446572][T14305] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1096.454828][T14305] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1096.462796][T14305] R13: 0000000000000c11 R14: 00000000004ccec9 R15: 000000000075bf2c [ 1096.501573][T14331] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1096.518491][T14305] Mem-Info: [ 1096.522671][T14305] active_anon:1433693 inactive_anon:62 isolated_anon:0 [ 1096.522671][T14305] active_file:579 inactive_file:740 isolated_file:31 [ 1096.522671][T14305] unevictable:0 dirty:33 writeback:0 unstable:0 [ 1096.522671][T14305] slab_reclaimable:7659 slab_unreclaimable:87624 [ 1096.522671][T14305] mapped:53152 shmem:69 pagetables:28020 bounce:0 [ 1096.522671][T14305] free:12038 free_pcp:206 free_cma:0 [ 1096.560875][T14331] selinux_nlmsg_perm: 242 callbacks suppressed [ 1096.560884][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.561628][T14305] Node 0 active_anon:5734772kB inactive_anon:248kB active_file:2516kB inactive_file:2860kB unevictable:0kB isolated(anon):0kB isolated(file):124kB mapped:212708kB dirty:132kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1096.568060][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.581847][T14305] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1096.648070][T14305] lowmem_reserve[]: 0 2926 6432 6432 [ 1096.654887][T14305] DMA32 free:21224kB min:4660kB low:7656kB high:10652kB active_anon:2813100kB inactive_anon:20kB active_file:2548kB inactive_file:2960kB unevictable:0kB writepending:28kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13440kB pagetables:28832kB bounce:0kB free_pcp:948kB local_pcp:488kB free_cma:0kB [ 1096.686633][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.703842][T14305] lowmem_reserve[]: 0 0 3506 3506 [ 1096.711079][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.725385][T14305] Normal free:9456kB min:9684kB low:13272kB high:16860kB active_anon:2922124kB inactive_anon:228kB active_file:332kB inactive_file:964kB unevictable:0kB writepending:4kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20960kB pagetables:83248kB bounce:0kB free_pcp:348kB local_pcp:248kB free_cma:0kB [ 1096.764558][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.771807][T14305] lowmem_reserve[]: 0 0 0 0 [ 1096.778574][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.784463][T14305] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1096.796267][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.826242][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.842367][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.855660][T14305] DMA32: 9*4kB (MH) 7*8kB (UMEH) 44*16kB (ME) 78*32kB (UMEH) 38*64kB (UMEH) 12*128kB (ME) 8*256kB (UMEH) 5*512kB (UME) 3*1024kB (M) 2*2048kB (UE) 0*4096kB = 19036kB [ 1096.855909][T14331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14331 comm=syz-executor.4 [ 1096.889289][T14305] Normal: 409*4kB (UMEH) 190*8kB (UMH) 84*16kB (UME) 87*32kB (UMEH) 24*64kB (UME) 5*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9460kB [ 1096.907728][T14305] 2245 total pagecache pages [ 1096.913001][T14305] 0 pages in swap cache [ 1096.919002][T14305] Swap cache stats: add 0, delete 0, find 0/0 [ 1096.925382][T14305] Free swap = 0kB [ 1096.944569][T14305] Total swap = 0kB [ 1096.959010][T14305] 1965979 pages RAM [ 1096.963070][T14305] 0 pages HighMem/MovableOnly [ 1096.979025][T14305] 314802 pages reserved [ 1097.000619][T14305] 0 pages cma reserved [ 1097.005653][T14305] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.4,pid=31280,uid=0 18:17:44 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:44 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000190019050000000000000000022000001e"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:44 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1", 0x6c}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:44 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1097.046238][T14305] Out of memory: Killed process 31280 (syz-executor.4) total-vm:72848kB, anon-rss:16548kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 18:17:44 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x210) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1097.185880][T14352] netlink: 184 bytes leftover after parsing attributes in process `syz-executor.4'. 18:17:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:45 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:45 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:45 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99"], 0x214) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:45 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac", 0x6d}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:45 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:46 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:46 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:46 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x214) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:46 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:46 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac", 0x6d}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1099.616366][T14425] syz-executor.1 invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=1000 [ 1099.629249][T14425] CPU: 1 PID: 14425 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1099.639421][T14425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.649471][T14425] Call Trace: [ 1099.652794][T14425] dump_stack+0x1b0/0x228 [ 1099.657128][T14425] ? devkmsg_release+0x127/0x127 [ 1099.662065][T14425] ? ___ratelimit+0x3bf/0x560 [ 1099.666751][T14425] ? show_regs_print_info+0x18/0x18 [ 1099.671956][T14425] ? _raw_spin_lock+0xa1/0x170 [ 1099.676718][T14425] ? radix_tree_cpu_dead+0x180/0x180 [ 1099.682000][T14425] dump_header+0xd8/0x730 [ 1099.686329][T14425] oom_kill_process+0xd7/0x280 [ 1099.691069][T14425] out_of_memory+0x5b6/0x890 [ 1099.695644][T14425] ? unregister_oom_notifier+0x20/0x20 [ 1099.701095][T14425] ? __kasan_check_write+0x14/0x20 [ 1099.706192][T14425] __alloc_pages_nodemask+0x27e3/0x3010 [ 1099.711722][T14425] ? mprotect_fixup+0x72d/0x820 [ 1099.716554][T14425] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1099.722093][T14425] ? cpumask_any_but+0xa9/0xc0 [ 1099.726845][T14425] ? perf_event_namespaces_output+0x4c0/0x4c0 [ 1099.732912][T14425] handle_mm_fault+0x1723/0x41c0 [ 1099.737838][T14425] ? vma_set_page_prot+0x171/0x1f0 [ 1099.743065][T14425] ? mprotect_fixup+0x603/0x820 [ 1099.747913][T14425] ? finish_fault+0x230/0x230 [ 1099.752578][T14425] ? __kasan_check_write+0x14/0x20 [ 1099.757679][T14425] ? up_write+0xa1/0x190 [ 1099.761933][T14425] ? vmacache_update+0xb7/0x120 [ 1099.766767][T14425] do_user_addr_fault+0x516/0xb50 [ 1099.771807][T14425] __do_page_fault+0xa0/0x160 [ 1099.776482][T14425] do_page_fault+0x74/0x390 [ 1099.780969][T14425] page_fault+0x2f/0x40 [ 1099.785221][T14425] RIP: 0033:0x45dd4d [ 1099.789104][T14425] Code: 5b 5d f3 c3 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ea ff ff ff 48 85 ff 0f 84 e0 8c fb ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 <48> 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 [ 1099.810295][T14425] RSP: 002b:00007fff040bdfc8 EFLAGS: 00010202 [ 1099.816348][T14425] RAX: ffffffffffffffea RBX: 00007fbaf078c700 RCX: 00007fbaf078c700 [ 1099.824304][T14425] RDX: 00000000003d0f00 RSI: 00007fbaf078bdb0 RDI: 0000000000411f80 [ 1099.832263][T14425] RBP: 00007fff040be1e0 R08: 00007fbaf078c9d0 R09: 00007fbaf078c700 [ 1099.840307][T14425] R10: 00007fbaf078bdc0 R11: 0000000000000246 R12: 0000000000000000 [ 1099.848267][T14425] R13: 00007fff040be07f R14: 00007fbaf078c9c0 R15: 000000000075bf2c [ 1099.878165][T14425] Mem-Info: [ 1099.881364][T14425] active_anon:1437014 inactive_anon:62 isolated_anon:0 [ 1099.881364][T14425] active_file:354 inactive_file:360 isolated_file:46 [ 1099.881364][T14425] unevictable:0 dirty:34 writeback:0 unstable:0 [ 1099.881364][T14425] slab_reclaimable:7703 slab_unreclaimable:87467 [ 1099.881364][T14425] mapped:52764 shmem:69 pagetables:27945 bounce:0 [ 1099.881364][T14425] free:9347 free_pcp:159 free_cma:0 [ 1099.919150][T14425] Node 0 active_anon:5748060kB inactive_anon:256kB active_file:1220kB inactive_file:1280kB unevictable:0kB isolated(anon):0kB isolated(file):232kB mapped:210936kB dirty:152kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1099.943720][T14425] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1099.974888][T14425] lowmem_reserve[]: 0 2926 6432 6432 [ 1099.987246][T14425] DMA32 free:18468kB min:4660kB low:7656kB high:10652kB active_anon:2818896kB inactive_anon:28kB active_file:1288kB inactive_file:1212kB unevictable:0kB writepending:0kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13376kB pagetables:28812kB bounce:0kB free_pcp:256kB local_pcp:0kB free_cma:0kB [ 1100.054350][T14425] lowmem_reserve[]: 0 0 3506 3506 [ 1100.083474][T14425] Normal free:3988kB min:5588kB low:9176kB high:12764kB active_anon:2928928kB inactive_anon:228kB active_file:40kB inactive_file:4kB unevictable:0kB writepending:28kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:21024kB pagetables:83144kB bounce:0kB free_pcp:604kB local_pcp:488kB free_cma:0kB [ 1100.169284][T14425] lowmem_reserve[]: 0 0 0 0 [ 1100.174247][T14425] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1100.229570][T14425] DMA32: 586*4kB (UMEH) 248*8kB (UMH) 63*16kB (M) 45*32kB (UMH) 44*64kB (UMEH) 19*128kB (M) 7*256kB (UME) 5*512kB (UME) 3*1024kB (M) 2*2048kB (UE) 0*4096kB = 23544kB [ 1100.246978][T14425] Normal: 106*4kB (UMH) 53*8kB (UMEH) 18*16kB (UME) 43*32kB (UMEH) 24*64kB (UME) 5*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4688kB [ 1100.276142][T14425] 648 total pagecache pages [ 1100.286511][T14425] 0 pages in swap cache [ 1100.296629][T14425] Swap cache stats: add 0, delete 0, find 0/0 [ 1100.309739][T14425] Free swap = 0kB [ 1100.318179][T14425] Total swap = 0kB [ 1100.326717][T14425] 1965979 pages RAM [ 1100.335140][T14425] 0 pages HighMem/MovableOnly [ 1100.347015][T14425] 314802 pages reserved [ 1100.355982][T14425] 0 pages cma reserved [ 1100.366015][T14425] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.4,pid=31202,uid=0 [ 1100.383988][T14425] Out of memory: Killed process 31202 (syz-executor.4) total-vm:72848kB, anon-rss:16548kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 18:17:47 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:47 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x214) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:47 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:47 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:47 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac", 0x6d}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1101.510340][ T3679] kworker/u4:9 invoked oom-killer: gfp_mask=0xcd0(GFP_KERNEL|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 1101.522193][ T3679] CPU: 0 PID: 3679 Comm: kworker/u4:9 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1101.532077][ T3679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.542128][ T3679] Workqueue: writeback wb_workfn (flush-8:0) [ 1101.548093][ T3679] Call Trace: [ 1101.551372][ T3679] dump_stack+0x1b0/0x228 [ 1101.555830][ T3679] ? devkmsg_release+0x127/0x127 [ 1101.560750][ T3679] ? ___ratelimit+0x3bf/0x560 [ 1101.565481][ T3679] ? show_regs_print_info+0x18/0x18 [ 1101.570674][ T3679] ? _raw_spin_lock+0xa1/0x170 [ 1101.575436][ T3679] ? radix_tree_cpu_dead+0x180/0x180 [ 1101.580697][ T3679] dump_header+0xd8/0x730 [ 1101.585020][ T3679] oom_kill_process+0xd7/0x280 [ 1101.589761][ T3679] out_of_memory+0x5b6/0x890 [ 1101.594326][ T3679] ? unregister_oom_notifier+0x20/0x20 [ 1101.599774][ T3679] ? __kasan_check_write+0x14/0x20 [ 1101.604859][ T3679] __alloc_pages_nodemask+0x27e3/0x3010 [ 1101.610470][ T3679] ? __writeback_single_inode+0x1f6/0xbe0 [ 1101.616221][ T3679] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1101.621842][ T3679] ? wb_workfn+0x8bc/0x13a0 [ 1101.626342][ T3679] ? process_one_work+0x9d8/0x1030 [ 1101.631438][ T3679] ? worker_thread+0xbbc/0x1610 [ 1101.636276][ T3679] ? kthread+0x31a/0x340 [ 1101.640500][ T3679] ? ret_from_fork+0x1f/0x30 [ 1101.645087][ T3679] ? wb_writeback+0x600/0xc30 [ 1101.649746][ T3679] ? wb_workfn+0x8bc/0x13a0 [ 1101.654235][ T3679] ? process_one_work+0x9d8/0x1030 [ 1101.659343][ T3679] ? kthread+0x31a/0x340 [ 1101.663597][ T3679] alloc_slab_page+0x3f/0x390 [ 1101.668270][ T3679] new_slab+0x3e8/0x430 [ 1101.672522][ T3679] ___slab_alloc+0x2e0/0x450 [ 1101.677117][ T3679] ? ext4_init_io_end+0x29/0x100 [ 1101.682044][ T3679] ? __should_failslab+0x11a/0x160 [ 1101.687149][ T3679] ? ext4_init_io_end+0x29/0x100 [ 1101.692091][ T3679] kmem_cache_alloc+0x203/0x2b0 [ 1101.696938][ T3679] ext4_init_io_end+0x29/0x100 [ 1101.701759][ T3679] ext4_writepages+0x13ca/0x47a0 [ 1101.706700][ T3679] ? ext4_readpage+0x310/0x310 [ 1101.711444][ T3679] ? ext4_get_group_desc+0x24e/0x2a0 [ 1101.716731][ T3679] ? __kasan_check_read+0x11/0x20 [ 1101.721750][ T3679] ? __ext4_get_inode_loc+0x4a0/0x10b0 [ 1101.727203][ T3679] ? finish_task_switch+0x274/0x560 [ 1101.732396][ T3679] ? ext4_get_inode_loc+0x70/0x70 [ 1101.737415][ T3679] ? __schedule+0xea0/0x1700 [ 1101.742000][ T3679] ? ext4_readpage+0x310/0x310 [ 1101.747101][ T3679] do_writepages+0x12e/0x290 [ 1101.751687][ T3679] ? __kasan_check_write+0x14/0x20 [ 1101.756820][ T3679] ? __writepage+0xd0/0xd0 [ 1101.761233][ T3679] ? __ext4_iget+0x45c0/0x45c0 [ 1101.766029][ T3679] ? _raw_spin_lock+0xa1/0x170 [ 1101.770788][ T3679] ? preempt_schedule+0xeb/0x110 [ 1101.775699][ T3679] ? schedule_preempt_disabled+0x20/0x20 [ 1101.781325][ T3679] __writeback_single_inode+0x1f6/0xbe0 [ 1101.786910][ T3679] writeback_sb_inodes+0xa88/0x19c0 [ 1101.792134][ T3679] ? queue_io+0x500/0x500 [ 1101.796476][ T3679] ? __kasan_check_write+0x14/0x20 [ 1101.801618][ T3679] ? down_read_trylock+0x17a/0x1e0 [ 1101.806714][ T3679] ? __kasan_check_write+0x14/0x20 [ 1101.811846][ T3679] ? wb_update_bandwidth+0xd9/0x130 [ 1101.817035][ T3679] __writeback_inodes_wb+0x119/0x380 [ 1101.822309][ T3679] ? __kasan_check_read+0x11/0x20 [ 1101.827321][ T3679] wb_writeback+0x600/0xc30 [ 1101.831836][ T3679] ? stack_trace_snprint+0x150/0x150 [ 1101.837107][ T3679] ? wb_io_lists_depopulated+0x170/0x170 [ 1101.842866][ T3679] ? set_worker_desc+0x149/0x1b0 [ 1101.848397][ T3679] ? cpumask_next+0x23/0x30 [ 1101.852890][ T3679] wb_workfn+0x8bc/0x13a0 [ 1101.857210][ T3679] ? inode_wait_for_writeback+0x2d0/0x2d0 [ 1101.862940][ T3679] ? __kasan_check_read+0x11/0x20 [ 1101.867958][ T3679] ? __perf_event_task_sched_in+0x4ed/0x550 [ 1101.873845][ T3679] ? __kasan_check_read+0x11/0x20 [ 1101.878893][ T3679] ? perf_pmu_sched_task+0x370/0x370 [ 1101.884175][ T3679] ? __kasan_check_read+0x11/0x20 [ 1101.889191][ T3679] ? _raw_spin_unlock_irq+0x9/0x20 [ 1101.894294][ T3679] ? finish_task_switch+0x274/0x560 [ 1101.899547][ T3679] ? __kasan_check_read+0x11/0x20 [ 1101.904627][ T3679] ? read_word_at_a_time+0x12/0x20 [ 1101.909868][ T3679] ? strscpy+0xbc/0x270 [ 1101.914000][ T3679] process_one_work+0x9d8/0x1030 [ 1101.918918][ T3679] worker_thread+0xbbc/0x1610 [ 1101.923599][ T3679] kthread+0x31a/0x340 [ 1101.927660][ T3679] ? process_one_work+0x1030/0x1030 [ 1101.932957][ T3679] ? kthread_destroy_worker+0x270/0x270 [ 1101.938627][ T3679] ret_from_fork+0x1f/0x30 [ 1101.943799][ T3679] Mem-Info: [ 1101.946920][ T3679] active_anon:1437538 inactive_anon:60 isolated_anon:0 [ 1101.946920][ T3679] active_file:17 inactive_file:40 isolated_file:12 [ 1101.946920][ T3679] unevictable:0 dirty:9 writeback:0 unstable:0 [ 1101.946920][ T3679] slab_reclaimable:7754 slab_unreclaimable:87447 [ 1101.946920][ T3679] mapped:52226 shmem:69 pagetables:28043 bounce:0 [ 1101.946920][ T3679] free:9561 free_pcp:31 free_cma:0 [ 1101.984823][ T3679] Node 0 active_anon:5750152kB inactive_anon:240kB active_file:20kB inactive_file:464kB unevictable:0kB isolated(anon):0kB isolated(file):48kB mapped:209032kB dirty:36kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1102.009957][ T3679] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1102.038174][ T3679] lowmem_reserve[]: 0 2926 6432 6432 [ 1102.043648][ T3679] DMA32 free:17340kB min:4660kB low:7656kB high:10652kB active_anon:2820648kB inactive_anon:12kB active_file:216kB inactive_file:380kB unevictable:0kB writepending:36kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13824kB pagetables:29152kB bounce:0kB free_pcp:520kB local_pcp:272kB free_cma:0kB [ 1102.073653][ T3679] lowmem_reserve[]: 0 0 3506 3506 [ 1102.078890][ T3679] Normal free:4176kB min:5588kB low:9176kB high:12764kB active_anon:2929504kB inactive_anon:228kB active_file:16kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:20992kB pagetables:83020kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1102.107901][ T3679] lowmem_reserve[]: 0 0 0 0 [ 1102.112559][ T3679] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1102.125896][ T3679] DMA32: 56*4kB (UEH) 26*8kB (UMEH) 9*16kB (UME) 21*32kB (UMEH) 6*64kB (UMEH) 42*128kB (ME) 8*256kB (UME) 3*512kB (M) 3*1024kB (M) 2*2048kB (UE) 0*4096kB = 17760kB [ 1102.150976][ T3679] Normal: 55*4kB (UEH) 23*8kB (UMH) 8*16kB (UMH) 40*32kB (UMEH) 25*64kB (UMEH) 4*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3924kB [ 1102.174585][ T3679] 183 total pagecache pages [ 1102.180785][ T3679] 0 pages in swap cache [ 1102.184998][ T3679] Swap cache stats: add 0, delete 0, find 0/0 [ 1102.191477][ T3679] Free swap = 0kB [ 1102.206370][ T3679] Total swap = 0kB [ 1102.210361][ T3679] 1965979 pages RAM [ 1102.214202][ T3679] 0 pages HighMem/MovableOnly [ 1102.218929][ T3679] 314802 pages reserved [ 1102.223077][ T3679] 0 pages cma reserved [ 1102.227122][ T3679] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.1,pid=31071,uid=0 [ 1102.241420][ T3679] Out of memory: Killed process 31071 (syz-executor.1) total-vm:72848kB, anon-rss:16552kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:17:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:49 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:49 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:49 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x216) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:49 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1102.644415][T14504] selinux_nlmsg_perm: 324 callbacks suppressed [ 1102.644685][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.705958][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.719454][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.733812][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.747374][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.761037][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.777644][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.790717][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.803668][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 [ 1103.834434][T14504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14504 comm=syz-executor.4 18:17:51 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:51 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:51 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:51 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x216) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:51 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a57caf"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:51 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:51 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f992721"], 0x216) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:51 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1105.539837][T10887] udevd invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=-1000 [ 1105.565062][T10887] CPU: 0 PID: 10887 Comm: udevd Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1105.574476][T10887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.584677][T10887] Call Trace: [ 1105.587964][T10887] dump_stack+0x1b0/0x228 [ 1105.592294][T10887] ? devkmsg_release+0x127/0x127 [ 1105.597222][T10887] ? ___ratelimit+0x3bf/0x560 [ 1105.601915][T10887] ? show_regs_print_info+0x18/0x18 [ 1105.607110][T10887] ? _raw_spin_lock+0xa1/0x170 [ 1105.611859][T10887] ? radix_tree_cpu_dead+0x180/0x180 [ 1105.617145][T10887] dump_header+0xd8/0x730 [ 1105.621458][T10887] oom_kill_process+0xd7/0x280 [ 1105.626218][T10887] out_of_memory+0x5b6/0x890 [ 1105.630797][T10887] ? unregister_oom_notifier+0x20/0x20 [ 1105.637200][T10887] ? __kasan_check_write+0x14/0x20 [ 1105.642324][T10887] __alloc_pages_nodemask+0x27e3/0x3010 [ 1105.647882][T10887] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1105.653418][T10887] ? should_fail+0x18e/0x860 [ 1105.658033][T10887] ? __do_pipe_flags+0x4c/0x210 [ 1105.662873][T10887] ? do_pipe2+0x8f/0x2b0 [ 1105.667222][T10887] ? copy_process+0x59b/0x52d0 [ 1105.672012][T10887] ? kasan_slab_alloc+0xe/0x10 [ 1105.676758][T10887] copy_process+0x5eb/0x52d0 [ 1105.681348][T10887] ? security_file_alloc+0x36/0x210 [ 1105.686542][T10887] ? setup_fault_attr+0x2b0/0x2b0 [ 1105.691660][T10887] ? __should_failslab+0x11a/0x160 [ 1105.696760][T10887] ? expand_files+0xd1/0x970 [ 1105.701339][T10887] ? kasan_slab_alloc+0xe/0x10 [ 1105.706207][T10887] ? kmem_cache_alloc+0x120/0x2b0 [ 1105.711226][T10887] ? fork_idle+0x290/0x290 [ 1105.715638][T10887] ? selinux_file_alloc_security+0x1d/0x120 [ 1105.721537][T10887] ? __kasan_check_write+0x14/0x20 [ 1105.726771][T10887] ? _raw_spin_lock+0xa1/0x170 [ 1105.731519][T10887] ? _raw_spin_trylock_bh+0x190/0x190 [ 1105.736878][T10887] ? blk_crypto_evict_key+0x110/0x110 [ 1105.742349][T10887] _do_fork+0x185/0x950 [ 1105.746502][T10887] ? _raw_spin_unlock+0x9/0x20 [ 1105.751257][T10887] ? __alloc_fd+0x4e6/0x590 [ 1105.755763][T10887] ? dup_mm+0x330/0x330 [ 1105.759908][T10887] ? __fd_install+0x119/0x250 [ 1105.764693][T10887] __x64_sys_clone+0x247/0x2b0 [ 1105.769477][T10887] ? __ia32_sys_vfork+0x110/0x110 [ 1105.774488][T10887] ? syscall_return_slowpath+0x6f/0x500 [ 1105.780028][T10887] do_syscall_64+0xc0/0x100 [ 1105.784533][T10887] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1105.790442][T10887] RIP: 0033:0x7f609f431f46 [ 1105.794836][T10887] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 14 25 10 00 00 00 31 d2 49 81 c2 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 31 01 00 00 85 c0 41 89 c4 0f 85 3b 01 00 [ 1105.814472][T10887] RSP: 002b:00007ffe740de6f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1105.822877][T10887] RAX: ffffffffffffffda RBX: 00007ffe740de6f0 RCX: 00007f609f431f46 [ 1105.830980][T10887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1105.838944][T10887] RBP: 00007ffe740de750 R08: 0000000000002a87 R09: 0000000000002a87 [ 1105.846900][T10887] R10: 00007f609fd4ea70 R11: 0000000000000246 R12: 0000000000000000 [ 1105.854875][T10887] R13: 00007ffe740de710 R14: 0000000000000005 R15: 0000000000000005 [ 1105.930160][T10887] Mem-Info: [ 1105.933793][T10887] active_anon:1436416 inactive_anon:62 isolated_anon:0 [ 1105.933793][T10887] active_file:214 inactive_file:201 isolated_file:32 [ 1105.933793][T10887] unevictable:0 dirty:9 writeback:0 unstable:0 [ 1105.933793][T10887] slab_reclaimable:7770 slab_unreclaimable:87629 [ 1105.933793][T10887] mapped:52594 shmem:69 pagetables:28257 bounce:0 [ 1105.933793][T10887] free:9273 free_pcp:483 free_cma:0 [ 1105.971686][T10887] Node 0 active_anon:5745664kB inactive_anon:248kB active_file:532kB inactive_file:676kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:210076kB dirty:36kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1105.996142][T10887] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1106.022768][T10887] lowmem_reserve[]: 0 2926 6432 6432 [ 1106.028609][T10887] DMA32 free:17660kB min:4660kB low:7656kB high:10652kB active_anon:2815980kB inactive_anon:8kB active_file:556kB inactive_file:708kB unevictable:0kB writepending:88kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13472kB pagetables:29796kB bounce:0kB free_pcp:2564kB local_pcp:1172kB free_cma:0kB [ 1106.078254][T10887] lowmem_reserve[]: 0 0 3506 3506 [ 1106.083403][T10887] Normal free:4068kB min:5588kB low:9176kB high:12764kB active_anon:2929756kB inactive_anon:228kB active_file:16kB inactive_file:0kB unevictable:0kB writepending:12kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:21184kB pagetables:82896kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 1106.112484][T10887] lowmem_reserve[]: 0 0 0 0 [ 1106.117086][T10887] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1106.130602][T10887] DMA32: 53*4kB (UMEH) 15*8kB (UMEH) 28*16kB (UME) 33*32kB (UEH) 4*64kB (UE) 36*128kB (ME) 8*256kB (ME) 3*512kB (M) 3*1024kB (M) 2*2048kB (UE) 0*4096kB = 17452kB [ 1106.154818][T10887] Normal: 89*4kB (UEH) 33*8kB (UEH) 19*16kB (UMEH) 54*32kB (UMEH) 24*64kB (UME) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4316kB [ 1106.185214][T10887] 139 total pagecache pages [ 1106.197034][T10887] 0 pages in swap cache [ 1106.203464][T10887] Swap cache stats: add 0, delete 0, find 0/0 [ 1106.210053][T10887] Free swap = 0kB [ 1106.214766][T10887] Total swap = 0kB [ 1106.218739][T10887] 1965979 pages RAM [ 1106.222848][T10887] 0 pages HighMem/MovableOnly [ 1106.227759][T10887] 314802 pages reserved [ 1106.232197][T10887] 0 pages cma reserved [ 1106.236510][T10887] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.3,pid=14472,uid=0 [ 1106.251162][T10887] Out of memory: Killed process 14472 (syz-executor.3) total-vm:73112kB, anon-rss:16568kB, file-rss:34824kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1106.274174][ T23] oom_reaper: reaped process 14472 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 18:17:53 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:53 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:53 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:53 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x217) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:53 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1106.983173][T14613] blkid invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-1000 [ 1107.019043][T14613] CPU: 1 PID: 14613 Comm: blkid Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1107.028448][T14613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.038630][T14613] Call Trace: [ 1107.041934][T14613] dump_stack+0x1b0/0x228 [ 1107.046279][T14613] ? devkmsg_release+0x127/0x127 [ 1107.051340][T14613] ? ___ratelimit+0x3bf/0x560 [ 1107.056051][T14613] ? show_regs_print_info+0x18/0x18 [ 1107.061255][T14613] ? _raw_spin_lock+0xa1/0x170 [ 1107.066094][T14613] ? radix_tree_cpu_dead+0x180/0x180 [ 1107.071393][T14613] dump_header+0xd8/0x730 [ 1107.075737][T14613] oom_kill_process+0xd7/0x280 [ 1107.080510][T14613] out_of_memory+0x5b6/0x890 [ 1107.085101][T14613] ? unregister_oom_notifier+0x20/0x20 [ 1107.090686][T14613] ? __kasan_check_write+0x14/0x20 [ 1107.095808][T14613] __alloc_pages_nodemask+0x27e3/0x3010 [ 1107.101368][T14613] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1107.106920][T14613] ? free_unref_page_commit+0x109/0x360 [ 1107.112486][T14613] handle_mm_fault+0x146c/0x41c0 [ 1107.117434][T14613] ? finish_fault+0x230/0x230 [ 1107.122118][T14613] ? up_write+0xa1/0x190 [ 1107.127148][T14613] ? vmacache_find+0x21f/0x4d0 [ 1107.131923][T14613] do_user_addr_fault+0x516/0xb50 [ 1107.136972][T14613] __do_page_fault+0xa0/0x160 [ 1107.141657][T14613] do_page_fault+0x74/0x390 [ 1107.146284][T14613] page_fault+0x2f/0x40 [ 1107.150445][T14613] RIP: 0010:clear_user+0x8c/0xd0 [ 1107.155722][T14613] Code: 4c 89 f0 4c 01 e0 72 54 4c 39 f8 77 4f e8 6c b2 bd fd 0f 1f 00 44 89 e0 83 e0 07 49 c1 ec 03 4c 89 e1 4c 89 f7 48 85 c9 74 0f <48> c7 07 00 00 00 00 48 83 c7 08 ff c9 75 f1 48 89 c1 85 c9 74 0a [ 1107.175327][T14613] RSP: 0018:ffff88801d287a90 EFLAGS: 00010206 [ 1107.181390][T14613] RAX: 0000000000000004 RBX: 0000000000608000 RCX: 000000000000019f [ 1107.189357][T14613] RDX: 0000000000000000 RSI: 00007ffffffff000 RDI: 0000000000607304 [ 1107.197322][T14613] RBP: ffff88801d287ab0 R08: ffffffff838525f2 R09: ffffed1024ba7b11 [ 1107.205315][T14613] R10: ffffed1024ba7b11 R11: 0000000000000000 R12: 000000000000019f [ 1107.213278][T14613] R13: ffff888125d3dcc0 R14: 0000000000607304 R15: 00007ffffffff000 [ 1107.221262][T14613] ? clear_user+0x62/0xd0 [ 1107.225599][T14613] load_elf_binary+0x1bde/0x3720 [ 1107.230540][T14613] ? load_elf_binary+0x801/0x3720 [ 1107.235566][T14613] ? bm_evict_inode+0xd0/0xd0 [ 1107.240255][T14613] ? load_script+0x970/0x970 [ 1107.244848][T14613] search_binary_handler+0x190/0x5e0 [ 1107.250268][T14613] __do_execve_file+0x12a2/0x1c00 [ 1107.255321][T14613] ? do_execve_file+0x40/0x40 [ 1107.259998][T14613] ? getname_flags+0x214/0x640 [ 1107.264771][T14613] __x64_sys_execve+0x94/0xb0 [ 1107.269447][T14613] do_syscall_64+0xc0/0x100 [ 1107.273952][T14613] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1107.279855][T14613] RIP: 0033:0x7f609f432207 [ 1107.284286][T14613] Code: Bad RIP value. [ 1107.288350][T14613] RSP: 002b:00007ffe740de758 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 1107.296944][T14613] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f609f432207 [ 1107.305002][T14613] RDX: 00000000015bd2c0 RSI: 00007ffe740de850 RDI: 00007ffe740df860 [ 1107.313102][T14613] RBP: 0000000000625500 R08: 00000000000035b3 R09: 00000000000035b3 [ 1107.321463][T14613] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000015bd2c0 [ 1107.330222][T14613] R13: 0000000000000007 R14: 000000000156d030 R15: 0000000000000005 [ 1107.340056][T14613] Mem-Info: [ 1107.343552][T14613] active_anon:1436724 inactive_anon:58 isolated_anon:0 [ 1107.343552][T14613] active_file:168 inactive_file:219 isolated_file:32 [ 1107.343552][T14613] unevictable:0 dirty:18 writeback:0 unstable:0 [ 1107.343552][T14613] slab_reclaimable:7784 slab_unreclaimable:87695 [ 1107.343552][T14613] mapped:52605 shmem:69 pagetables:28252 bounce:0 [ 1107.343552][T14613] free:9159 free_pcp:174 free_cma:0 [ 1107.381302][T14613] Node 0 active_anon:5746896kB inactive_anon:232kB active_file:672kB inactive_file:768kB unevictable:0kB isolated(anon):0kB isolated(file):8kB mapped:210320kB dirty:72kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1107.406922][T14613] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1107.435072][T14613] lowmem_reserve[]: 0 2926 6432 6432 [ 1107.440587][T14613] DMA32 free:16976kB min:4660kB low:7656kB high:10652kB active_anon:2815996kB inactive_anon:4kB active_file:528kB inactive_file:876kB unevictable:0kB writepending:60kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13792kB pagetables:30116kB bounce:0kB free_pcp:1144kB local_pcp:0kB free_cma:0kB [ 1107.470434][T14613] lowmem_reserve[]: 0 0 3506 3506 [ 1107.476122][T14613] Normal free:3756kB min:5588kB low:9176kB high:12764kB active_anon:2930024kB inactive_anon:228kB active_file:4kB inactive_file:12kB unevictable:0kB writepending:12kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:21152kB pagetables:82892kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1107.506501][T14613] lowmem_reserve[]: 0 0 0 0 [ 1107.511383][T14613] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1107.524980][T14613] DMA32: 27*4kB (UMEH) 14*8kB (UH) 12*16kB (UME) 11*32kB (UEH) 33*64kB (UMEH) 38*128kB (UME) 8*256kB (ME) 3*512kB (M) 4*1024kB (UM) 1*2048kB (E) 0*4096kB = 17468kB [ 1107.542856][T14613] Normal: 99*4kB (UMEH) 35*8kB (UMEH) 19*16kB (UMEH) 39*32kB (UMEH) 24*64kB (UME) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3892kB [ 1107.580218][T14613] 187 total pagecache pages [ 1107.597837][T14613] 0 pages in swap cache [ 1107.603688][T14613] Swap cache stats: add 0, delete 0, find 0/0 [ 1107.610216][T14613] Free swap = 0kB [ 1107.614403][T14613] Total swap = 0kB [ 1107.618587][T14613] 1965979 pages RAM [ 1107.622841][T14613] 0 pages HighMem/MovableOnly [ 1107.628003][T14613] 314802 pages reserved [ 1107.632641][T14613] 0 pages cma reserved [ 1107.637179][T14613] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.3,pid=14585,uid=0 [ 1107.652164][T14613] Out of memory: Killed process 14585 (syz-executor.3) total-vm:72848kB, anon-rss:16552kB, file-rss:34828kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:17:55 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:55 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:55 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6", 0x4e}], 0x4, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:55 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:55 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x217) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1108.288235][T14647] selinux_nlmsg_perm: 230 callbacks suppressed [ 1108.288247][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.323856][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.369293][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.382629][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.414935][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.429859][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.444129][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.457932][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.471625][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.771823][ T1887] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1108.839082][ T1887] CPU: 0 PID: 1887 Comm: syz-fuzzer Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1108.841426][T14647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14647 comm=syz-executor.4 [ 1108.848820][ T1887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.848824][ T1887] Call Trace: [ 1108.848839][ T1887] dump_stack+0x1b0/0x228 [ 1108.848849][ T1887] ? devkmsg_release+0x127/0x127 [ 1108.848855][ T1887] ? ___ratelimit+0x3bf/0x560 [ 1108.848863][ T1887] ? show_regs_print_info+0x18/0x18 [ 1108.848876][ T1887] ? _raw_spin_lock+0xa1/0x170 [ 1108.900778][ T1887] ? radix_tree_cpu_dead+0x180/0x180 [ 1108.906053][ T1887] dump_header+0xd8/0x730 [ 1108.910374][ T1887] oom_kill_process+0xd7/0x280 [ 1108.915125][ T1887] out_of_memory+0x5b6/0x890 [ 1108.919716][ T1887] ? unregister_oom_notifier+0x20/0x20 [ 1108.925157][ T1887] ? __kasan_check_write+0x14/0x20 [ 1108.930251][ T1887] __alloc_pages_nodemask+0x27e3/0x3010 [ 1108.935784][ T1887] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1108.941317][ T1887] ? page_cache_prev_miss+0x3e0/0x3e0 [ 1108.946676][ T1887] pagecache_get_page+0x4df/0x830 [ 1108.951690][ T1887] ? __count_memcg_events+0x32/0x1b0 [ 1108.957049][ T1887] filemap_fault+0x1457/0x19b0 [ 1108.961822][ T1887] ? generic_file_read_iter+0x2070/0x2070 [ 1108.967518][ T1887] ext4_filemap_fault+0x83/0xa0 [ 1108.972349][ T1887] handle_mm_fault+0x291e/0x41c0 [ 1108.977266][ T1887] ? finish_fault+0x230/0x230 [ 1108.981935][ T1887] ? vmacache_find+0x3bc/0x4d0 [ 1108.986742][ T1887] do_user_addr_fault+0x516/0xb50 [ 1108.991918][ T1887] __do_page_fault+0xa0/0x160 [ 1108.996656][ T1887] do_page_fault+0x74/0x390 [ 1109.001134][ T1887] page_fault+0x2f/0x40 [ 1109.005263][ T1887] RIP: 0033:0x7a529c [ 1109.009134][ T1887] Code: ff ff 31 d2 48 8b 5c 24 68 eb 76 48 89 54 24 40 48 8d 5c d1 60 31 f6 48 87 33 48 89 74 24 38 48 c1 e2 04 48 8d 3d 64 bf 10 01 <4c> 8b 44 17 08 48 8b 14 17 48 89 54 24 10 4c 89 44 24 18 48 8d 15 [ 1109.029644][ T1887] RSP: 002b:000000c4353e7b00 EFLAGS: 00010246 [ 1109.035805][ T1887] RAX: 000000c43059fc80 RBX: 000000c42016bea0 RCX: 000000c42016be40 [ 1109.043772][ T1887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000018b1200 [ 1109.051813][ T1887] RBP: 000000c4353e7c60 R08: 2fd3598dd6cfbf43 R09: 000000000000002f [ 1109.059762][ T1887] R10: 0000000000000001 R11: 000000c433da2270 R12: 0000000000000011 [ 1109.067708][ T1887] R13: 0000000000000011 R14: 00000000000000f8 R15: 0000000000000008 [ 1109.092786][ T1887] Mem-Info: [ 1109.129969][ T1887] active_anon:1432783 inactive_anon:62 isolated_anon:0 [ 1109.129969][ T1887] active_file:448 inactive_file:1371 isolated_file:0 [ 1109.129969][ T1887] unevictable:0 dirty:23 writeback:0 unstable:0 [ 1109.129969][ T1887] slab_reclaimable:7770 slab_unreclaimable:87556 [ 1109.129969][ T1887] mapped:53460 shmem:69 pagetables:28116 bounce:0 [ 1109.129969][ T1887] free:11716 free_pcp:746 free_cma:0 [ 1109.167738][ T1887] Node 0 active_anon:5731132kB inactive_anon:248kB active_file:1792kB inactive_file:5584kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:213840kB dirty:92kB writeback:0kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1109.192326][ T1887] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1109.218729][ T1887] lowmem_reserve[]: 0 2926 6432 6432 [ 1109.224515][ T1887] DMA32 free:38140kB min:4660kB low:7656kB high:10652kB active_anon:2787452kB inactive_anon:20kB active_file:1688kB inactive_file:6528kB unevictable:0kB writepending:80kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13280kB pagetables:29572kB bounce:0kB free_pcp:2276kB local_pcp:940kB free_cma:0kB [ 1109.254839][ T1887] lowmem_reserve[]: 0 0 3506 3506 [ 1109.260391][ T1887] Normal free:6168kB min:5588kB low:9176kB high:12764kB active_anon:2927280kB inactive_anon:228kB active_file:104kB inactive_file:56kB unevictable:0kB writepending:12kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:21056kB pagetables:82892kB bounce:0kB free_pcp:1312kB local_pcp:1276kB free_cma:0kB [ 1109.291994][ T1887] lowmem_reserve[]: 0 0 0 0 [ 1109.299937][ T1887] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1109.313728][ T1887] DMA32: 1210*4kB (UMEH) 569*8kB (UMEH) 310*16kB (UMEH) 130*32kB (UMH) 61*64kB (UMEH) 53*128kB (ME) 8*256kB (ME) 3*512kB (M) 4*1024kB (UM) 1*2048kB (E) 0*4096kB = 38928kB [ 1109.331311][ T1887] Normal: 348*4kB (UMEH) 83*8kB (UMEH) 40*16kB (UMEH) 59*32kB (UMEH) 24*64kB (UME) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6248kB [ 1109.346633][ T1887] 2464 total pagecache pages [ 1109.351628][ T1887] 0 pages in swap cache [ 1109.356141][ T1887] Swap cache stats: add 0, delete 0, find 0/0 [ 1109.362770][ T1887] Free swap = 0kB [ 1109.367186][ T1887] Total swap = 0kB [ 1109.373594][ T1887] 1965979 pages RAM [ 1109.377540][ T1887] 0 pages HighMem/MovableOnly [ 1109.382379][ T1887] 314802 pages reserved [ 1109.386811][ T1887] 0 pages cma reserved [ 1109.390961][ T1887] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.4,pid=30982,uid=0 [ 1109.405375][ T1887] Out of memory: Killed process 30982 (syz-executor.4) total-vm:72848kB, anon-rss:16548kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:160kB oom_score_adj:1000 18:17:56 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x217) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1109.424464][ T23] oom_reaper: reaped process 30982 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB 18:17:56 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:56 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:56 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:58 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:17:58 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:58 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:58 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:17:58 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:17:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1112.047941][ T1884] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1112.059897][ T1884] CPU: 0 PID: 1884 Comm: syz-fuzzer Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1112.069627][ T1884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.079687][ T1884] Call Trace: [ 1112.082992][ T1884] dump_stack+0x1b0/0x228 [ 1112.087496][ T1884] ? devkmsg_release+0x127/0x127 [ 1112.092457][ T1884] ? ___ratelimit+0x3bf/0x560 [ 1112.098649][ T1884] ? show_regs_print_info+0x18/0x18 [ 1112.103879][ T1884] ? _raw_spin_lock+0xa1/0x170 [ 1112.108647][ T1884] ? radix_tree_cpu_dead+0x180/0x180 [ 1112.113922][ T1884] dump_header+0xd8/0x730 [ 1112.118341][ T1884] oom_kill_process+0xd7/0x280 [ 1112.123958][ T1884] out_of_memory+0x5b6/0x890 [ 1112.130214][ T1884] ? unregister_oom_notifier+0x20/0x20 [ 1112.135677][ T1884] ? __kasan_check_write+0x14/0x20 [ 1112.140777][ T1884] __alloc_pages_nodemask+0x27e3/0x3010 [ 1112.146461][ T1884] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1112.152458][ T1884] ? page_cache_prev_miss+0x3e0/0x3e0 [ 1112.157851][ T1884] pagecache_get_page+0x4df/0x830 [ 1112.162887][ T1884] ? __count_memcg_events+0x32/0x1b0 [ 1112.168191][ T1884] filemap_fault+0x1457/0x19b0 [ 1112.173130][ T1884] ? generic_file_read_iter+0x2070/0x2070 [ 1112.178846][ T1884] ext4_filemap_fault+0x83/0xa0 [ 1112.183747][ T1884] handle_mm_fault+0x291e/0x41c0 [ 1112.188687][ T1884] ? finish_fault+0x230/0x230 [ 1112.193367][ T1884] ? retint_kernel+0x1b/0x1b [ 1112.197945][ T1884] ? __down_read+0x240/0x240 [ 1112.202728][ T1884] ? vmacache_find+0x494/0x4d0 [ 1112.207507][ T1884] do_user_addr_fault+0x516/0xb50 [ 1112.212640][ T1884] __do_page_fault+0xa0/0x160 [ 1112.217314][ T1884] do_page_fault+0x74/0x390 [ 1112.221813][ T1884] page_fault+0x2f/0x40 [ 1112.225979][ T1884] RIP: 0033:0x450570 [ 1112.229872][ T1884] Code: 20 48 89 6c 24 18 48 8d 6c 24 18 48 8b 44 24 28 48 8b 80 28 01 00 00 48 89 04 24 e8 ea 72 ff ff 48 8b 44 24 08 48 85 c0 74 52 <8b> 40 10 83 f8 09 75 0b 0f b6 0d f3 66 a1 01 84 c9 74 38 83 f8 0a [ 1112.250772][ T1884] RSP: 002b:000000c42004bf70 EFLAGS: 00010206 [ 1112.256939][ T1884] RAX: 0000000000bfc418 RBX: 0000000000a5c720 RCX: 0000000000bfc418 [ 1112.264989][ T1884] RDX: 0000000000a5c730 RSI: 00000000000024ac RDI: 00000000001b9a95 [ 1112.272993][ T1884] RBP: 000000c42004bf88 R08: 00000000000022f8 R09: 0000000000000005 [ 1112.280962][ T1884] R10: 00000110c66c1e08 R11: 0000000000000030 R12: 000000c4327ab750 [ 1112.288938][ T1884] R13: 000000c4327ab780 R14: 000000c4285e2cc0 R15: 0000000000000001 [ 1112.338597][ T1884] Mem-Info: [ 1112.349335][ T1884] active_anon:1436638 inactive_anon:59 isolated_anon:0 [ 1112.349335][ T1884] active_file:276 inactive_file:416 isolated_file:32 [ 1112.349335][ T1884] unevictable:0 dirty:42 writeback:29 unstable:0 [ 1112.349335][ T1884] slab_reclaimable:7770 slab_unreclaimable:87330 [ 1112.349335][ T1884] mapped:52820 shmem:69 pagetables:28275 bounce:0 [ 1112.349335][ T1884] free:9297 free_pcp:428 free_cma:0 [ 1112.399242][ T1884] Node 0 active_anon:5746552kB inactive_anon:236kB active_file:1104kB inactive_file:1208kB unevictable:0kB isolated(anon):0kB isolated(file):160kB mapped:210680kB dirty:168kB writeback:116kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1112.424208][ T1884] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1112.455967][ T1884] lowmem_reserve[]: 0 2926 6432 6432 [ 1112.462032][ T1884] DMA32 free:18288kB min:4660kB low:7656kB high:10652kB active_anon:2815072kB inactive_anon:8kB active_file:1416kB inactive_file:1556kB unevictable:0kB writepending:272kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13696kB pagetables:30344kB bounce:0kB free_pcp:640kB local_pcp:252kB free_cma:0kB [ 1112.492374][ T1884] lowmem_reserve[]: 0 0 3506 3506 [ 1112.518897][ T1884] Normal free:4004kB min:5588kB low:9176kB high:12764kB active_anon:2931304kB inactive_anon:228kB active_file:4kB inactive_file:12kB unevictable:0kB writepending:12kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:21152kB pagetables:82756kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1112.558892][ T1884] lowmem_reserve[]: 0 0 0 0 [ 1112.572975][ T1884] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1112.592701][ T1884] DMA32: 470*4kB (UMEH) 126*8kB (UMEH) 29*16kB (UMEH) 16*32kB (UMEH) 9*64kB (UEH) 54*128kB (UME) 8*256kB (ME) 3*512kB (M) 3*1024kB (M) 1*2048kB (E) 0*4096kB = 20056kB [ 1112.610913][ T1884] Normal: 149*4kB (UMEH) 39*8kB (UMEH) 24*16kB (UMEH) 34*32kB (UMEH) 24*64kB (UME) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4044kB [ 1112.627655][ T1884] 276 total pagecache pages [ 1112.633475][ T1884] 0 pages in swap cache [ 1112.639095][ T1884] Swap cache stats: add 0, delete 0, find 0/0 [ 1112.646043][ T1884] Free swap = 0kB [ 1112.650714][ T1884] Total swap = 0kB [ 1112.655461][ T1884] 1965979 pages RAM [ 1112.660891][ T1884] 0 pages HighMem/MovableOnly [ 1112.667007][ T1884] 314802 pages reserved [ 1112.672208][ T1884] 0 pages cma reserved [ 1112.677116][ T1884] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.2,pid=14730,uid=0 [ 1112.786083][ T1884] Out of memory: Killed process 14730 (syz-executor.2) total-vm:73112kB, anon-rss:16564kB, file-rss:34860kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 18:18:00 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:00 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:00 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:00 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:00 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1113.818597][T14787] syz-executor.4 invoked oom-killer: gfp_mask=0x100dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO), order=0, oom_score_adj=1000 [ 1113.839196][T14787] CPU: 0 PID: 14787 Comm: syz-executor.4 Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1113.849919][T14787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.860166][T14787] Call Trace: [ 1113.863593][T14787] dump_stack+0x1b0/0x228 [ 1113.867922][T14787] ? devkmsg_release+0x127/0x127 [ 1113.872885][T14787] ? ___ratelimit+0x3bf/0x560 [ 1113.877685][T14787] ? show_regs_print_info+0x18/0x18 [ 1113.882894][T14787] ? _raw_spin_lock+0xa1/0x170 [ 1113.887643][T14787] ? radix_tree_cpu_dead+0x180/0x180 [ 1113.892927][T14787] dump_header+0xd8/0x730 [ 1113.897265][T14787] oom_kill_process+0xd7/0x280 [ 1113.902101][T14787] out_of_memory+0x5b6/0x890 [ 1113.906670][T14787] ? unregister_oom_notifier+0x20/0x20 [ 1113.912126][T14787] ? __kasan_check_write+0x14/0x20 [ 1113.917250][T14787] __alloc_pages_nodemask+0x27e3/0x3010 [ 1113.922812][T14787] ? kmem_cache_alloc+0x120/0x2b0 [ 1113.927855][T14787] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 1113.933391][T14787] ? up_read+0x10/0x10 [ 1113.937479][T14787] ? anon_vma_interval_tree_insert+0x31d/0x330 [ 1113.943632][T14787] ? __anon_vma_prepare+0x3b5/0x4a0 [ 1113.948827][T14787] handle_mm_fault+0x1723/0x41c0 [ 1113.954192][T14787] ? find_vma+0x160/0x160 [ 1113.958523][T14787] ? get_unmapped_area+0x31c/0x380 [ 1113.963613][T14787] ? up_write+0xa1/0x190 [ 1113.967854][T14787] ? finish_fault+0x230/0x230 [ 1113.972564][T14787] ? vmacache_update+0xb7/0x120 [ 1113.977844][T14787] do_user_addr_fault+0x516/0xb50 [ 1113.982868][T14787] __do_page_fault+0xa0/0x160 [ 1113.987775][T14787] do_page_fault+0x74/0x390 [ 1113.992284][T14787] page_fault+0x2f/0x40 [ 1113.996421][T14787] RIP: 0033:0x412b8f [ 1114.000395][T14787] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 1114.020042][T14787] RSP: 002b:00007ffdb2f7bfe0 EFLAGS: 00010206 [ 1114.026178][T14787] RAX: 00007f5481c42000 RBX: 0000000000020000 RCX: 000000000045b3ea [ 1114.034614][T14787] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 1114.043121][T14787] RBP: 00007ffdb2f7c0c0 R08: ffffffffffffffff R09: 0000000000000000 [ 1114.051250][T14787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdb2f7c1b0 [ 1114.059238][T14787] R13: 00007f5481c62700 R14: 0000000000000001 R15: 000000000075bfd4 [ 1114.129896][T14787] Mem-Info: [ 1114.137682][T14787] active_anon:1436205 inactive_anon:62 isolated_anon:0 [ 1114.137682][T14787] active_file:231 inactive_file:214 isolated_file:32 [ 1114.137682][T14787] unevictable:0 dirty:33 writeback:1 unstable:0 [ 1114.137682][T14787] slab_reclaimable:7769 slab_unreclaimable:87296 [ 1114.137682][T14787] mapped:52649 shmem:69 pagetables:28249 bounce:0 [ 1114.137682][T14787] free:10066 free_pcp:211 free_cma:0 [ 1114.205039][T14787] Node 0 active_anon:5744820kB inactive_anon:248kB active_file:608kB inactive_file:1156kB unevictable:0kB isolated(anon):0kB isolated(file):156kB mapped:210296kB dirty:132kB writeback:4kB shmem:276kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1114.259139][T14787] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1114.302800][T14787] lowmem_reserve[]: 0 2926 6432 6432 [ 1114.314521][T14787] DMA32 free:44904kB min:8756kB low:11752kB high:14748kB active_anon:2786532kB inactive_anon:20kB active_file:956kB inactive_file:4416kB unevictable:0kB writepending:136kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:13440kB pagetables:30232kB bounce:0kB free_pcp:552kB local_pcp:272kB free_cma:0kB [ 1114.358468][T14787] lowmem_reserve[]: 0 0 3506 3506 [ 1114.365186][T14787] Normal free:3480kB min:5588kB low:9176kB high:12764kB active_anon:2928960kB inactive_anon:228kB active_file:8kB inactive_file:4kB unevictable:0kB writepending:0kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:21120kB pagetables:82764kB bounce:0kB free_pcp:2636kB local_pcp:1336kB free_cma:0kB [ 1114.396000][T14787] lowmem_reserve[]: 0 0 0 0 [ 1114.433478][T14787] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 1114.482753][T14787] DMA32: 470*4kB (UMEH) 409*8kB (UMEH) 220*16kB (UMEH) 95*32kB (UMEH) 40*64kB (UMH) 37*128kB (M) 14*256kB (M) 10*512kB (M) 4*1024kB (M) 5*2048kB (UM) 0*4096kB = 42048kB [ 1114.500011][T14787] Normal: 156*4kB (UMEH) 44*8kB (UMEH) 40*16kB (UMEH) 23*32kB (UMEH) 24*64kB (UME) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4016kB [ 1114.516998][T14787] 2605 total pagecache pages [ 1114.522195][T14787] 0 pages in swap cache [ 1114.526462][T14787] Swap cache stats: add 0, delete 0, find 0/0 [ 1114.532881][T14787] Free swap = 0kB [ 1114.536655][T14787] Total swap = 0kB [ 1114.540452][T14787] 1965979 pages RAM [ 1114.544241][T14787] 0 pages HighMem/MovableOnly [ 1114.549062][T14787] 314802 pages reserved [ 1114.553573][T14787] 0 pages cma reserved [ 1114.557676][T14787] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/,task=syz-executor.3,pid=14704,uid=0 [ 1114.572111][T14787] Out of memory: Killed process 14704 (syz-executor.3) total-vm:72848kB, anon-rss:16552kB, file-rss:34840kB, shmem-rss:0kB, UID:0 pgtables:156kB oom_score_adj:1000 [ 1114.590523][T14806] selinux_nlmsg_perm: 230 callbacks suppressed [ 1114.590532][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.609667][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.622620][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.635860][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.649274][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.662739][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 18:18:01 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 18:18:01 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:01 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:01 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a5"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1114.676102][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.689426][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.702917][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 [ 1114.716404][T14806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14806 comm=syz-executor.4 18:18:01 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:18:02 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:02 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:02 executing program 2: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d965"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:02 executing program 3: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x218) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:02 executing program 0: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d77d4b6828042134c5e409af2744c2ed1ce6e", 0x80}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x3, 0x0, 0x4000}, 0x10) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1f9) ioctl$TCSETXW(r3, 0x5435, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="700000000c060108000000000000000003000004050001000700000005000100070000000900020073797a31000000000900020073797a32000000000500010007000000050001000700000005000100070000000500010007000000090002007379903200000000050001000700000a"], 0x70}, 0x1, 0x0, 0x0, 0x24000040}, 0x40) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x801, 0x0) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, 0xa, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFTA_SET_USERDATA={0x83, 0xd, 0x1, 0x0, "7e18b231ea98931b0fcfcfea4ded62f48eb2e99c2564926bbd5a16679435e925fddcf8db44e53b87c4121a36d932bf2b90f5de2be59d96aeed7c29d56df8b3272b31882126173349d3e49dff6949a5844e74b8f32613417056510699ec8e6944f60b6247b4eef8bc2911f294a41295330fdeb44ca36bea66e3bfb60d7ffca6"}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xca}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0xbc}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 18:18:02 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[]}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1115.604406][T14881] kasan: CONFIG_KASAN_INLINE enabled 18:18:02 executing program 1: getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f00000003c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f00000004c0)=0x2c) socketpair(0x8, 0x80000, 0x80, &(0x7f0000000240)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="f1ad781906f8ef419e1aead3ae8c95b526f8bc71088b30a46e53421fe15faa19d9150c4b8dc4a9d29278e8653ccefce3545b6aedfb5b453bd1eefeab799a9b20e62606b66e321ac6d9333abbe1a2372fbe1ef98fa9cefd0f53db6ce89487a5567b037925aea913689db0daa1ac8d", 0x6e}]) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000004c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1}, 0x10) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e06000000000000006c0e09d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2dba5236e1882c601f2b49e32098f6919c7234ce9fe065d74f23c995de2be4e7b3881c92986a5aba827995c4ea9173085931c9f9abb4a2956cfba8227afd19e8f003e80efbe0b10d442ddd93c1436c9cbafacbe4b03ba4b656f9029509bed808f4aa86c8dc50de43149543b911caf5e9ccd3c36c416e6ba34d30721ffc6933bef175b6dcfcb5c2c428f750e12bf08cf6a46df9b9e5b00c8de1d6687f10b410b852c6008250f2fe940ed50dc3a13984b627b85d0809e6a420000a94f8aa31b1b16bf8a7523fb07b1b5ee027b413acacb65253484b86864a9a35fa81fd34083873063604893b9890834bc1bee1f2d34137b74920371226fd9e796b5586d354ba2edab762282359b53a77689cb44983404e0c9aaf10fba67eb0a0dbb369052f97b8cae9d4786bce825d47510a349a27b62fb717b0bb54fbed154f843d015d42821342c63c73f258e073785a912d1f8f57097dbec0a620af636b7b24bafaf17cff8469da189f841876520883d80f6906e2127b243a01d6b924605afd336d9c106a848a1fb23bf925abf4bf3d7729c91d3ae3483d50251d5f813f1f7f8fda49277f3ae64634926a3e6823f6cbb38d6573f99272109a57caf"], 0x21a) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x7, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3, 0x0, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1115.892543][T14881] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1115.918884][T14881] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1115.926632][T14881] CPU: 0 PID: 14881 Comm: modprobe Not tainted 5.4.16-syzkaller-01258-g4a192aa559b1 #0 [ 1115.936249][T14881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.946315][T14881] RIP: 0010:path_openat+0x324/0x3c00 [ 1115.955424][T14881] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 1115.977457][T14881] RSP: 0018:ffff888045bef920 EFLAGS: 00010247 [ 1115.983725][T14881] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888045befb48 [ 1115.996359][T14881] RDX: ffff8881ad2ce518 RSI: 0000000000000000 RDI: 0000000000000004 [ 1116.004349][T14881] RBP: ffff888045befbf0 R08: ffffffff81782ec1 R09: 0000000000000003 [ 1116.012402][T14881] R10: ffffed1008b7ded7 R11: 0000000000000004 R12: ffff888045befc48 [ 1116.020665][T14881] R13: ffff8881c4a2d500 R14: ffff888045befe40 R15: dffffc0000000000 [ 1116.031371][T14881] FS: 00007f75214b8700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1116.040794][T14881] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1116.047619][T14881] CR2: 0000001b2c020000 CR3: 000000003fd29001 CR4: 00000000001606f0 [ 1116.055608][T14881] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1116.063585][T14881] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1116.071560][T14881] Call Trace: [ 1116.074857][T14881] ? do_filp_open+0x430/0x430 [ 1116.079546][T14881] ? getname_flags+0xba/0x640 [ 1116.084201][T14881] ? getname+0x19/0x20 [ 1116.088258][T14881] ? do_sys_open+0x32a/0x7a0 [ 1116.092829][T14881] ? __x64_sys_open+0x87/0x90 [ 1116.097576][T14881] ? do_syscall_64+0xc0/0x100 [ 1116.102243][T14881] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1116.108327][T14881] ? get_mem_cgroup_from_mm+0x2b2/0x330 [ 1116.113857][T14881] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 1116.119655][T14881] ? mem_cgroup_from_task+0x60/0x60 [ 1116.124855][T14881] ? __kasan_check_read+0x11/0x20 [ 1116.129862][T14881] ? __lru_cache_add+0x1ae/0x200 [ 1116.134796][T14881] ? expand_files+0xd1/0x970 [ 1116.139381][T14881] do_filp_open+0x1f7/0x430 [ 1116.143862][T14881] ? vfs_tmpfile+0x230/0x230 [ 1116.148595][T14881] ? __kasan_check_read+0x11/0x20 [ 1116.153595][T14881] ? __check_object_size+0x309/0x3d0 [ 1116.158872][T14881] ? _raw_spin_unlock+0x9/0x20 [ 1116.163628][T14881] ? get_unused_fd_flags+0x97/0xb0 [ 1116.168735][T14881] do_sys_open+0x36f/0x7a0 [ 1116.173264][T14881] ? file_open_root+0x440/0x440 [ 1116.178108][T14881] ? __kasan_check_read+0x11/0x20 [ 1116.183139][T14881] ? do_user_addr_fault+0x6b7/0xb50 [ 1116.188533][T14881] __x64_sys_open+0x87/0x90 [ 1116.193049][T14881] do_syscall_64+0xc0/0x100 [ 1116.197538][T14881] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1116.203425][T14881] RIP: 0033:0x7f7520dd0120 [ 1116.207819][T14881] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 1116.227408][T14881] RSP: 002b:00007ffddcc7f788 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1116.235831][T14881] RAX: ffffffffffffffda RBX: 0000563fc1b9f1c0 RCX: 00007f7520dd0120 [ 1116.243792][T14881] RDX: 00007ffddcc7f9bc RSI: 0000000000080000 RDI: 00007ffddcc7f9a0 [ 1116.251749][T14881] RBP: 00007f75212a0300 R08: 0000000000000000 R09: 0000563fc1b9f199 [ 1116.259728][T14881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000563fc1b9f220 [ 1116.267703][T14881] R13: 0000563fc1b9f190 R14: 0000563fc1b9f220 R15: 00007ffddcc7f9a0 [ 1116.275690][T14881] Modules linked in: [ 1116.293268][T14881] ---[ end trace 7244da66595c6a03 ]--- [ 1116.316568][T14881] RIP: 0010:path_openat+0x324/0x3c00 [ 1116.325367][T14881] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 1116.359533][T14881] RSP: 0018:ffff888045bef920 EFLAGS: 00010247 [ 1116.365746][T14881] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888045befb48 [ 1116.373859][T14881] RDX: ffff8881ad2ce518 RSI: 0000000000000000 RDI: 0000000000000004 [ 1116.381993][T14881] RBP: ffff888045befbf0 R08: ffffffff81782ec1 R09: 0000000000000003 [ 1116.390128][T14881] R10: ffffed1008b7ded7 R11: 0000000000000004 R12: ffff888045befc48 [ 1116.398260][T14881] R13: ffff8881c4a2d500 R14: ffff888045befe40 R15: dffffc0000000000 [ 1116.408019][T14881] FS: 00007f75214b8700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 1116.417297][T14881] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1116.424073][T14881] CR2: 0000000000449367 CR3: 000000003fd29005 CR4: 00000000001606f0 [ 1116.432515][T14881] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1116.440734][T14881] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1116.448910][T14881] Kernel panic - not syncing: Fatal exception [ 1116.456043][T14881] Kernel Offset: disabled [ 1116.460360][T14881] Rebooting in 86400 seconds..