0, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009380100021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1954.402309][T10619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1954.427866][T10619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1954.454472][T10622] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1954.550635][T10630] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1954.617229][T10622] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1954.633596][T10630] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:51:55 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_open_procfs(r0, &(0x7f0000000000)='smaps_rollup\x00') getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000080)=0x38) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:51:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x40030000000000}, 0x0) 08:51:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:51:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x60) 08:51:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x18a8c0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:51:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009020300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1957.129408][T10642] warn_alloc: 4 callbacks suppressed [ 1957.129430][T10642] syz-executor.4: vmalloc: allocation failure: 17179869200 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0-1 08:51:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xf0ffffffffffff}, 0x0) 08:51:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1957.205558][T10642] CPU: 1 PID: 10642 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 1957.214286][T10642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1957.224697][T10642] Call Trace: [ 1957.228003][T10642] dump_stack+0x197/0x210 [ 1957.232365][T10642] warn_alloc.cold+0x87/0x164 [ 1957.237060][T10642] ? zone_watermark_ok_safe+0x260/0x260 [ 1957.242622][T10642] ? fs_reclaim_release+0xf/0x30 [ 1957.247580][T10642] ? __kasan_check_read+0x11/0x20 [ 1957.252631][T10642] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1957.258812][T10642] __vmalloc_node_range+0x44c/0x790 [ 1957.264031][T10642] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1957.269856][T10642] ? ip_set_alloc+0x4d/0x5e [ 1957.274640][T10642] vzalloc+0x6b/0x90 [ 1957.278546][T10642] ? ip_set_alloc+0x4d/0x5e [ 1957.283089][T10642] ip_set_alloc+0x4d/0x5e [ 1957.287443][T10642] hash_netnet_create+0x413/0xa60 [ 1957.292491][T10642] ? hash_netnet4_list+0x1400/0x1400 [ 1957.297800][T10642] ip_set_create+0x6f1/0x1500 [ 1957.302493][T10642] ? ip_set_destroy+0xb70/0xb70 [ 1957.307384][T10642] ? ip_set_destroy+0xb70/0xb70 [ 1957.312255][T10642] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 1957.321220][T10642] ? nfnetlink_bind+0x2c0/0x2c0 [ 1957.326092][T10642] ? avc_has_extended_perms+0x10f0/0x10f0 [ 1957.331839][T10642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1957.338206][T10642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1957.344551][T10642] ? cred_has_capability+0x199/0x330 [ 1957.349863][T10642] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1957.355521][T10642] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1957.361179][T10642] ? __local_bh_enable_ip+0x15a/0x270 [ 1957.366581][T10642] ? __check_heap_object+0xa3/0xb3 [ 1957.371725][T10642] netlink_rcv_skb+0x177/0x450 [ 1957.377552][T10642] ? nfnetlink_bind+0x2c0/0x2c0 [ 1957.382777][T10642] ? netlink_ack+0xb50/0xb50 [ 1957.387387][T10642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1957.393649][T10642] ? ns_capable_common+0x93/0x100 [ 1957.398698][T10642] ? ns_capable+0x20/0x30 [ 1957.403068][T10642] ? __netlink_ns_capable+0x104/0x140 [ 1957.408470][T10642] nfnetlink_rcv+0x1ba/0x460 [ 1957.413085][T10642] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 1957.418656][T10642] ? netlink_deliver_tap+0x24a/0xbe0 [ 1957.423984][T10642] netlink_unicast+0x58c/0x7d0 [ 1957.428958][T10642] ? netlink_attachskb+0x870/0x870 [ 1957.434227][T10642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1957.440490][T10642] netlink_sendmsg+0x91c/0xea0 [ 1957.445296][T10642] ? netlink_unicast+0x7d0/0x7d0 [ 1957.450255][T10642] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1957.455570][T10642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1957.461825][T10642] ? security_socket_sendmsg+0x8d/0xc0 [ 1957.467308][T10642] ? netlink_unicast+0x7d0/0x7d0 [ 1957.472265][T10642] sock_sendmsg+0xd7/0x130 [ 1957.476708][T10642] ____sys_sendmsg+0x753/0x880 [ 1957.481582][T10642] ? kernel_sendmsg+0x50/0x50 [ 1957.486308][T10642] ? __fget+0x35d/0x550 [ 1957.490648][T10642] ? find_held_lock+0x35/0x130 [ 1957.495450][T10642] ___sys_sendmsg+0x100/0x170 [ 1957.500279][T10642] ? sendmsg_copy_msghdr+0x70/0x70 [ 1957.505462][T10642] ? __kasan_check_read+0x11/0x20 [ 1957.510651][T10642] ? __fget+0x37f/0x550 [ 1957.514913][T10642] ? ksys_dup3+0x3e0/0x3e0 [ 1957.519329][T10642] ? __fget_light+0x1a9/0x230 [ 1957.523994][T10642] ? __fdget+0x1b/0x20 [ 1957.528069][T10642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1957.534371][T10642] __sys_sendmsg+0x105/0x1d0 [ 1957.539123][T10642] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1957.544186][T10642] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1957.549656][T10642] ? do_syscall_64+0x26/0x790 [ 1957.554343][T10642] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1957.560424][T10642] ? do_syscall_64+0x26/0x790 [ 1957.565116][T10642] __x64_sys_sendmsg+0x78/0xb0 [ 1957.569900][T10642] do_syscall_64+0xfa/0x790 [ 1957.574428][T10642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1957.580334][T10642] RIP: 0033:0x45af49 [ 1957.584244][T10642] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1957.603853][T10642] RSP: 002b:00007f77a9fa7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1957.612423][T10642] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 1957.620411][T10642] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1957.628397][T10642] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1957.636379][T10642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77a9fa86d4 [ 1957.644376][T10642] R13: 00000000004c9d56 R14: 00000000004e2e48 R15: 00000000ffffffff [ 1957.653032][T10642] Mem-Info: 08:51:56 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009030300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1957.656795][T10642] active_anon:185928 inactive_anon:236 isolated_anon:0 [ 1957.656795][T10642] active_file:8067 inactive_file:26652 isolated_file:0 [ 1957.656795][T10642] unevictable:0 dirty:110 writeback:0 unstable:0 [ 1957.656795][T10642] slab_reclaimable:15757 slab_unreclaimable:102794 [ 1957.656795][T10642] mapped:60632 shmem:306 pagetables:2116 bounce:0 [ 1957.656795][T10642] free:579788 free_pcp:421 free_cma:0 08:51:56 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009040300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1957.706855][T10642] Node 0 active_anon:743664kB inactive_anon:876kB active_file:32136kB inactive_file:106592kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242564kB dirty:468kB writeback:0kB shmem:1164kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 206848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1957.742748][T10642] Node 1 active_anon:56kB inactive_anon:60kB active_file:132kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:60kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1957.776595][T10642] Node 0 DMA free:10408kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 08:51:56 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009050300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1957.812557][T10642] lowmem_reserve[]: 0 2535 2535 2535 2535 [ 1957.818772][T10642] Node 0 DMA32 free:162496kB min:117280kB low:126300kB high:135320kB reserved_highatomic:0KB active_anon:743664kB inactive_anon:876kB active_file:32136kB inactive_file:106592kB unevictable:0kB writepending:468kB present:3129332kB managed:2599264kB mlocked:0kB kernel_stack:8820kB pagetables:8560kB bounce:0kB free_pcp:1464kB local_pcp:612kB free_cma:0kB [ 1957.858953][T10642] lowmem_reserve[]: 0 0 0 0 0 [ 1957.863721][T10642] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1957.899821][T10642] lowmem_reserve[]: 0 0 0 0 0 08:51:56 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009060300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1957.904568][T10642] Node 1 Normal free:2145544kB min:53800kB low:67248kB high:80696kB reserved_highatomic:0KB active_anon:56kB inactive_anon:60kB active_file:132kB inactive_file:40kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:112kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1957.942256][T10642] lowmem_reserve[]: 0 0 0 0 0 [ 1957.947427][T10642] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 1*32kB (U) 0*64kB 1*128kB (U) 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10408kB [ 1957.968023][T10642] Node 0 DMA32: 4042*4kB (UME) 228*8kB (UM) 905*16kB (UM) 1077*32kB (UM) 495*64kB (UME) 183*128kB (UME) 80*256kB (UM) 42*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 164024kB [ 1957.992025][T10642] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1958.003908][T10642] Node 1 Normal: 202*4kB (UME) 224*8kB (UME) 200*16kB (UME) 191*32kB (UME) 184*64kB (UME) 171*128kB (UM) 165*256kB (UM) 165*512kB (UME) 159*1024kB (UME) 26*2048kB (UME) 429*4096kB (UM) = 2145544kB [ 1958.034766][T10642] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1958.046033][T10642] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1958.057409][T10642] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1958.068935][T10642] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1958.079371][T10642] 11433 total pagecache pages [ 1958.084697][T10642] 0 pages in swap cache [ 1958.101763][T10642] Swap cache stats: add 0, delete 0, find 0/0 [ 1958.108645][T10642] Free swap = 0kB [ 1958.112759][T10642] Total swap = 0kB [ 1958.117363][T10642] 1965979 pages RAM [ 1958.121557][T10642] 0 pages HighMem/MovableOnly [ 1958.127044][T10642] 344636 pages reserved [ 1958.131551][T10642] 0 pages cma reserved 08:51:58 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x4858, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080), 0x0, 0x80}, {&(0x7f00000002c0)="d7cfc55eb11760080c65a67855a980a42f91f5582de3ccf4bd814f95d64e260444dd6c13fb51d49c189118f0cb7ebdc4effb6ea5cb4517a93257a80a00b31d5a47898317a1dcd535ad7a90b0a21d20a790aaa45a98ad003ba762109693673fb45b0fbcdfe0ce37210501a3afd9e456e4e12762cb4498d1c517e8bca4ab81e7d2e877694c2b957f2c66f1cdaf0181fce2e22d34b01b6a4d78b298a5bcddbc0a4510f1d546751620eb358a86a942168aa15ca6c4426d753b09", 0xb8, 0x2}], 0x800, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2321d2e1e04c2034b5fe1aa42bb820"], 0x3) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x80000, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0xb8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) utimensat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f0000000140), 0x80) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:51:58 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009070300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:51:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:51:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf0) 08:51:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x1b0, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000001}, 0x4840) 08:51:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x100000000000000}, 0x0) 08:51:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x300) 08:51:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:51:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x200000000000000}, 0x0) [ 1960.230575][T10796] __nla_validate_parse: 20 callbacks suppressed [ 1960.230586][T10796] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:51:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xfffffffffffffdba, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000002}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL]}, 0x58}}, 0x0) [ 1960.327669][T10796] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1960.406788][T10851] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=cfd70000) [ 1960.489814][T10796] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1960.507090][T10908] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x6c8) 08:51:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00090a0300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1960.573850][T10912] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1960.646674][T10905] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=cfd70000) [ 1960.691180][T10924] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:51:59 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) fallocate(r2, 0x4, 0x0, 0x9) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:51:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x300000000000000}, 0x0) 08:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xa00) 08:51:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:51:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x1494, 0x8, 0xb, 0x0, 0x70bd26, 0x25dfdbfd, {0x5, 0x0, 0x1}, [@nested={0xc1, 0x35, 0x0, 0x1, [@generic="26d2fca6c18b292ca7bccb3cc84b320a06fa350cd322e3b222a99352", @typed={0x14, 0x9, 0x0, 0x0, @ipv6=@ipv4={[], [], @multicast2}}, @generic="441e8fbc0ab4d3034241b961693b72dfd2adc115abab1ba8acad97b1f57be38607a2d7e09273e119b7e10da56d7122ab4ee3db3e3498cb534c9196b98b6cc6730cf45a050126d6eb12e4a168d4801f4e54e26f73ccad38d8d1f66d1f7e15bca60fb79c6e048efec6b4ed874cd353e34d60691429a84cb7795b4701d7b77a09f2847f35feea140774e33624f079"]}, @nested={0x17b, 0x95, 0x0, 0x1, [@generic="df34ce35477dfcd0645b547d85add6dbd2b364724863a7baac08b4c7df5554728cef41ba8f8bd1bffc713f6b8f8fdf3ff14987329940ea635102c30c078c193de78c10ca62ecb8859c34e43aa39f767cf6b2a0edfbd8975617819e5c9f306dad25f12ddd5d3ac453e34afaa091d4b4653eca70e52ff4ddf11dafd65bfe19731b7354cca331a7e9c5fae65d2c5d4a3d8e74631135f3e706a5d0ad786c7af20c8fb3946514cc14da4fe66a7123d0cafb80bbe886d320de517c1fe096ed0a3bd7a64d0aff7176aef8f06c21c7994052e15bde8e5d1a5d6349d70f11ee96489c262b28f47a11609c808498", @generic="6c190dacaeab14cc8d9efab195c3a0b8cac7f21791f701d92e4167cca56611c1d5db63f7412f30889ed0c18812e20c1c5025bd93ac434fb9754d82bf1d42cc6295cbc03cee78d46f5819d1a0ea75436e8cb0a46d0798cf5fd41bd99a9f1baf367b3fd3fa575016544d8effe66b7a952effbc83f0d8330d7f599927773ae6a0303356", @typed={0x9, 0x3c, 0x0, 0x0, @str='syz2\x00'}]}, @generic="10d30390e732fc9b95183a3599ee6ffb8d2f5bd39081c523267790544388aa6fe458d69a284e6400c6a50afe6b42b2c4425c1c6aa88ae4f86fd9f176a081482da562dce906502323d7a76ba413182cdcac338c5aa40b14cd7531f1475c3e6595fff13ef6bdb829c9d0a3ed09974ed4425eed9ed1184fece1381825a47a7321b70827939f218780d58559339c7237e04be348a20e14047d37072ef45979b4e83ee7240cd55087d997faa49df91076f9a3b8ce9ff6ce76969e14646d833a46e0fc53a45703e6a75f5979927d29799d565d36599c0cfd04eb5093871129b32e26865ed249", @nested={0xc, 0xe, 0x0, 0x1, [@typed={0x8, 0x28, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}]}, @nested={0x103c, 0x8d, 0x0, 0x1, [@typed={0x14, 0x86, 0x0, 0x0, @ipv6=@loopback}, @typed={0x8, 0xf, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x26}}, @generic="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", @typed={0x11, 0x12, 0x0, 0x0, @str='hash:net,net\x00'}, @typed={0x8, 0x18, 0x0, 0x0, @pid=r2}]}, @nested={0xfe, 0x2d, 0x0, 0x1, [@generic="6c3b5de2703881042d0c4f94f3469f9422498b1ae6fcb0e6825eb7e8445b27540840ec60535c31967fc050c91a8d33381fd5b48cba522eeaa849449e0277a11cc5c6fca3b1c470c8b8c328", @typed={0x8, 0x2e, 0x0, 0x0, @uid=r4}, @typed={0x8, 0x91, 0x0, 0x0, @u32=0x2895}, @typed={0x8, 0x37, 0x0, 0x0, @fd=r0}, @generic, @generic="a50a6ca64d9c350ac3786e4076e7bfeec5cb39861a5fab623b3ab086e96ed884d0530b6817654cb31870b342015f453f3efd54040015ee79d9b1de987d4045dc6f29cc606b02dc1a58417b4d02e374815789a526955f3b5b8129a286e43786db0341834110984d5ba0c1a20631a51eeb501f0f0e3378a09c804683655ae86f77bc249159ea77ddc0276f6ae123c939", @typed={0x8, 0x47, 0x0, 0x0, @pid=r5}]}, @typed={0x14, 0xe, 0x0, 0x0, @ipv6=@ipv4={[], [], @local}}]}, 0x1494}, 0x1, 0x0, 0x0, 0x40000}, 0x88000) [ 1960.787201][T10927] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1960.798728][T10924] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1960.813243][T10927] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:51:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x400000000000000}, 0x0) 08:51:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00090e0300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:51:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xe00) 08:51:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:51:59 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0xfd82}, @IPSET_ATTR_TYPENAME={0x0, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_procs(r4, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RLOPEN(r7, &(0x7f0000000580)={0x18, 0xd, 0x1, {{0x8, 0x3, 0x2}, 0x1}}, 0x18) pwritev(r5, &(0x7f0000000540)=[{&(0x7f00000002c0)="f07e0762cbf146a65f926a8aefe2739d7e9b61ef80a3d917b4422086e6a421482f843b718ef6211a66ce2e28af1e54bd65feeca498155619ffa7b28fe83dee71", 0x40}, {&(0x7f0000000340)="f4d37355abd5738e774dab082ad55217fa1a679d0d6725c60a66a105d2bf79e1e4df8d6f43e9969bc070b15769c5f5c7d4355b0b8cb3f04545b11d70d21e55d7ff8740bf1daaa3ad008e55409c8ee266e36c9214600f3598d2a806f88bef320aa7a72cd866baed31f0890981f46eaac2e35044e69136c7c57f7910877a88acaf22b7403dcf0bc83010d91e6b156e84cf47b1e4646e1b3db17cdc65c10353db966aaeefdd6e62b25160fe86e6409ce4a108dd8e49e1e12dc6f669dc5c1a9086c9b93c980e34440415ec8ecb7ca487c100cc4cd538ef94da4dd1da75c5cb5ca70062cdedba8caea7bee70b038d", 0xec}, {&(0x7f0000000440)="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", 0xfd}], 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$x25(r2, &(0x7f0000000040)="52e7f4b7a7b77fd29ce37a0135309767f4410dbab8f6f7eb1ca143f9eabce48ff806af73b9f9ab2b1ee427aedd2e57a2fffc2197de26e07ebc596d39950dd9b9a60ed23faa5f5a5b5a70089f9a48de5fa065d809433701e27a6c3b92f939cd0875c81497abe43ca18e395a8acb07ede395a5adb9d62e05342d8bcbf3676a3e5d893a2bf031515c7c50dbeaecd96d72654134ba399617f0ce40fabc1ba554d0bd961252b244859303d6caeb60eaee3a9e5fb6e6b159350433140738109e6b9233d40cdd0dfdf0b4fe2a81645642121dfee7d27009c3df7521e04ab0b16ddec69c1e4d5e", 0xe3, 0x6400c80c, &(0x7f0000000240)={0x9, @remote={[], 0x2}}, 0x12) 08:51:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xa00000000000000}, 0x0) [ 1961.194072][T10952] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:51:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00091c0300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:02 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ptrace$setopts(0x4200, r0, 0x0, 0x0) 08:52:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf00) 08:52:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:02 executing program 4: prctl$PR_GET_FP_MODE(0x2e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x4000, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4142, 0x0) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x58}}, 0x20044084) 08:52:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xe00000000000000}, 0x0) 08:52:02 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009480300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7a6}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xf00000000000000}, 0x0) 08:52:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x4000) 08:52:02 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00094c0300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="581427000206050000000000000000000000000011000300080073683a6e65742c6e6574000000000900020073797a32000000000c000780080012406000000005000100070000000500040000005a85dba9ef4f40edeba90000050005000a000000"], 0x58}}, 0x0) 08:52:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:03 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="dc94245c22"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x1300000000000000}, 0x0) 08:52:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x6000) 08:52:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x8000000) 08:52:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009600300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xc806) 08:52:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x1400000000000000}, 0x0) 08:52:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009680300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@timestamp, @window={0x3, 0x3ff, 0x1ff}], 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0xc8, 0x2, 0x6, 0x5, 0x0, 0x0, {0x2}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x84, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x2}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4620}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1c000}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x4}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x5d}]}]}, 0xc8}}, 0x0) 08:52:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf000) [ 1964.852109][T11140] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 08:52:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x4000000000000000}, 0x0) 08:52:06 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='# '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf00}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:06 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00096c0300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0xfffffffffffffc28, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0xfffffffffffffe37}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:52:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x34000) 08:52:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x6000000000000000}, 0x0) 08:52:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1967.703400][T11271] __nla_validate_parse: 25 callbacks suppressed [ 1967.703411][T11271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x400300) 08:52:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x9effffff00000000}, 0x0) 08:52:06 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") fsync(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) [ 1967.782023][T11275] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1967.847501][T11271] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1967.866447][T11275] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf0ffff) 08:52:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1967.983332][T11288] warn_alloc: 3 callbacks suppressed [ 1967.983355][T11288] syz-executor.4: vmalloc: allocation failure: 17179869200 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 1968.032467][T11288] CPU: 1 PID: 11288 Comm: syz-executor.4 Not tainted 5.5.0-rc5-syzkaller #0 [ 1968.041201][T11288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1968.051269][T11288] Call Trace: [ 1968.054575][T11288] dump_stack+0x197/0x210 [ 1968.058932][T11288] warn_alloc.cold+0x87/0x164 [ 1968.063628][T11288] ? zone_watermark_ok_safe+0x260/0x260 [ 1968.069218][T11288] ? fs_reclaim_release+0xf/0x30 [ 1968.074188][T11288] ? __kasan_check_read+0x11/0x20 [ 1968.079236][T11288] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1968.085432][T11288] __vmalloc_node_range+0x44c/0x790 [ 1968.090645][T11288] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1968.096470][T11288] ? ip_set_alloc+0x4d/0x5e [ 1968.100991][T11288] vzalloc+0x6b/0x90 [ 1968.104895][T11288] ? ip_set_alloc+0x4d/0x5e [ 1968.109409][T11288] ip_set_alloc+0x4d/0x5e [ 1968.113753][T11288] hash_netnet_create+0x413/0xa60 [ 1968.118807][T11288] ? hash_netnet4_list+0x1400/0x1400 [ 1968.124202][T11288] ip_set_create+0x6f1/0x1500 [ 1968.129013][T11288] ? ip_set_destroy+0xb70/0xb70 [ 1968.133913][T11288] ? ip_set_destroy+0xb70/0xb70 [ 1968.138790][T11288] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 1968.143760][T11288] ? nfnetlink_bind+0x2c0/0x2c0 [ 1968.148631][T11288] ? avc_has_extended_perms+0x10f0/0x10f0 [ 1968.154412][T11288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1968.160756][T11288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1968.167015][T11288] ? cred_has_capability+0x199/0x330 [ 1968.172315][T11288] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1968.177976][T11288] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1968.183731][T11288] ? __local_bh_enable_ip+0x15a/0x270 [ 1968.189208][T11288] ? __check_heap_object+0xa3/0xb3 [ 1968.194348][T11288] netlink_rcv_skb+0x177/0x450 [ 1968.199141][T11288] ? nfnetlink_bind+0x2c0/0x2c0 [ 1968.204013][T11288] ? netlink_ack+0xb50/0xb50 [ 1968.208625][T11288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1968.214882][T11288] ? ns_capable_common+0x93/0x100 [ 1968.219928][T11288] ? ns_capable+0x20/0x30 [ 1968.224439][T11288] ? __netlink_ns_capable+0x104/0x140 [ 1968.229950][T11288] nfnetlink_rcv+0x1ba/0x460 [ 1968.234561][T11288] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 1968.240037][T11288] ? netlink_deliver_tap+0x24a/0xbe0 [ 1968.245537][T11288] netlink_unicast+0x58c/0x7d0 [ 1968.250325][T11288] ? netlink_attachskb+0x870/0x870 [ 1968.255466][T11288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1968.261728][T11288] netlink_sendmsg+0x91c/0xea0 [ 1968.266519][T11288] ? netlink_unicast+0x7d0/0x7d0 [ 1968.271470][T11288] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1968.276770][T11288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1968.283030][T11288] ? security_socket_sendmsg+0x8d/0xc0 [ 1968.288501][T11288] ? netlink_unicast+0x7d0/0x7d0 [ 1968.293433][T11288] sock_sendmsg+0xd7/0x130 [ 1968.297839][T11288] ____sys_sendmsg+0x753/0x880 [ 1968.302596][T11288] ? kernel_sendmsg+0x50/0x50 [ 1968.307265][T11288] ? __fget+0x35d/0x550 [ 1968.311410][T11288] ? find_held_lock+0x35/0x130 [ 1968.316179][T11288] ___sys_sendmsg+0x100/0x170 [ 1968.320847][T11288] ? sendmsg_copy_msghdr+0x70/0x70 [ 1968.325948][T11288] ? __kasan_check_read+0x11/0x20 [ 1968.330964][T11288] ? __fget+0x37f/0x550 [ 1968.335126][T11288] ? ksys_dup3+0x3e0/0x3e0 [ 1968.339549][T11288] ? __fget_light+0x1a9/0x230 [ 1968.344214][T11288] ? __fdget+0x1b/0x20 [ 1968.348269][T11288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1968.354585][T11288] __sys_sendmsg+0x105/0x1d0 [ 1968.359170][T11288] ? __sys_sendmsg_sock+0xc0/0xc0 [ 1968.364212][T11288] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1968.369662][T11288] ? do_syscall_64+0x26/0x790 [ 1968.374328][T11288] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1968.380381][T11288] ? do_syscall_64+0x26/0x790 [ 1968.385184][T11288] __x64_sys_sendmsg+0x78/0xb0 [ 1968.389956][T11288] do_syscall_64+0xfa/0x790 [ 1968.394481][T11288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1968.400363][T11288] RIP: 0033:0x45af49 [ 1968.404249][T11288] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1968.423868][T11288] RSP: 002b:00007f77a9fa7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1968.432274][T11288] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 1968.440235][T11288] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000004 [ 1968.448198][T11288] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1968.456249][T11288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f77a9fa86d4 [ 1968.464352][T11288] R13: 00000000004c9d56 R14: 00000000004e2e48 R15: 00000000ffffffff [ 1968.594934][T11288] Mem-Info: [ 1968.598316][T11288] active_anon:185911 inactive_anon:234 isolated_anon:0 [ 1968.598316][T11288] active_file:8067 inactive_file:26663 isolated_file:0 [ 1968.598316][T11288] unevictable:0 dirty:133 writeback:0 unstable:0 [ 1968.598316][T11288] slab_reclaimable:15701 slab_unreclaimable:102785 [ 1968.598316][T11288] mapped:60648 shmem:306 pagetables:2100 bounce:0 [ 1968.598316][T11288] free:581257 free_pcp:664 free_cma:0 [ 1968.637554][T11288] Node 0 active_anon:743588kB inactive_anon:876kB active_file:32136kB inactive_file:106612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242592kB dirty:528kB writeback:0kB shmem:1164kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 206848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1968.667770][T11288] Node 1 active_anon:56kB inactive_anon:60kB active_file:132kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:60kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1968.694805][T11288] Node 0 DMA free:10408kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1968.724211][T11288] lowmem_reserve[]: 0 2535 2535 2535 2535 [ 1968.730106][T11288] Node 0 DMA32 free:169112kB min:117280kB low:126300kB high:135320kB reserved_highatomic:0KB active_anon:743604kB inactive_anon:884kB active_file:32136kB inactive_file:106640kB unevictable:0kB writepending:552kB present:3129332kB managed:2599264kB mlocked:0kB kernel_stack:8752kB pagetables:8436kB bounce:0kB free_pcp:2648kB local_pcp:1348kB free_cma:0kB [ 1968.763330][T11288] lowmem_reserve[]: 0 0 0 0 0 [ 1968.768936][T11288] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1968.797601][T11288] lowmem_reserve[]: 0 0 0 0 0 [ 1968.802307][T11288] Node 1 Normal free:2145544kB min:53800kB low:67248kB high:80696kB reserved_highatomic:0KB active_anon:56kB inactive_anon:60kB active_file:132kB inactive_file:40kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:112kB pagetables:4kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 1968.833708][T11288] lowmem_reserve[]: 0 0 0 0 0 [ 1968.838551][T11288] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 1*32kB (U) 0*64kB 1*128kB (U) 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10408kB [ 1968.854908][T11288] Node 0 DMA32: 5488*4kB (UME) 231*8kB (UME) 888*16kB (UME) 1076*32kB (UME) 496*64kB (UM) 185*128kB (UME) 80*256kB (UM) 42*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 169848kB [ 1968.872144][T11288] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1968.883616][T11288] Node 1 Normal: 202*4kB (UME) 224*8kB (UME) 200*16kB (UME) 191*32kB (UME) 184*64kB (UME) 171*128kB (UM) 165*256kB (UM) 165*512kB (UME) 159*1024kB (UME) 26*2048kB (UME) 429*4096kB (UM) = 2145544kB [ 1968.903665][T11288] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1968.913543][T11288] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1968.922867][T11288] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1968.932462][T11288] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1968.942191][T11288] 11445 total pagecache pages [ 1968.946945][T11288] 0 pages in swap cache [ 1968.951130][T11288] Swap cache stats: add 0, delete 0, find 0/0 [ 1968.957275][T11288] Free swap = 0kB [ 1968.960991][T11288] Total swap = 0kB [ 1968.964707][T11288] 1965979 pages RAM [ 1968.968613][T11288] 0 pages HighMem/MovableOnly [ 1968.973288][T11288] 344636 pages reserved [ 1968.977511][T11288] 0 pages cma reserved 08:52:09 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2], 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r4, 0xae80, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009740300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x1000000) 08:52:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa607}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xd305000000000000}, 0x0) 08:52:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="580000000206050000002200000000000000000011000300686173683a6e65742c6e6574000000000900020073797a32000000000c000780080012406000000005000100070000000500040000000000050005000a000000"], 0x58}}, 0x0) [ 1970.782403][T11311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1970.804680][T11311] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) statx(r1, &(0x7f0000000140)='./file0\x00', 0x1000, 0x4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r4) fsopen(&(0x7f0000000280)='hugetlbfs\x00', 0x1) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000340)={0xa0, 0x0, 0x1, {{0x1, 0x1, 0x2, 0x3, 0x90dd, 0x8, {0x0, 0x2, 0x8, 0x2, 0x8d5e, 0x7, 0x7ff, 0x1, 0x3, 0xd95, 0xffffff8e, r2, r4, 0x8764, 0x7}}, {0x0, 0x8}}}, 0xa0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0xa0000001}) 08:52:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x2000000) [ 1970.877423][T11311] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xf0ffffff00000000}, 0x0) 08:52:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xf000}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00097a0300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1971.074650][T11383] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1971.144518][T11439] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x300, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x9, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x10) 08:52:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x3000000) 08:52:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xffffff7f00000000}, 0x0) [ 1971.211747][T11383] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:09 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x1) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32=r2], 0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r7) fchown(r3, r5, r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4068aea3, &(0x7f00000000c0)={0x3d, 0x0, [0x7, 0x5, 0x5]}) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000500021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="580000000206050000000000000000000000000011000300686173683a6e65742c6e6574000000000900021573797a32000000000c000780080012406000000005000100070000000500040000440000050005000a0000000b8c8aea9a820476eb38771a424a3b0e4dcf1855155b3ac24e8394464650a3d532f6c8060f423ae05f3d9a566bda0f520e30e29c913dd543d607d298602f8ed20fc8063863167bc6295f319f81e5d575f0"], 0x58}}, 0x0) 08:52:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xffffffff00000000}, 0x0) 08:52:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x4000000) 08:52:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x3, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1971.568912][T11459] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1971.654068][T11459] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 08:52:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0xfffffffffffff000}, 0x0) 08:52:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xa000000) 08:52:10 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x10, &(0x7f0000015000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000680)=""/73) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000340)={0x40, 0xef2, 0x3}) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000240)=0x0) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000280)={{0x0, 0x0, r1, r4, 0xee00, 0x2, 0x3}, 0x8, 0x7c1ee101, 0x5, 0x3, 0x0, r6, 0x5}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000380)={0x4007, 0x8001, 0x4, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r9, 0xc00c55ca, &(0x7f00000000c0)={0x7, 0x1, 0xfc}) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0xfffffffffffffc93, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:52:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000600021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x38, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:10 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYBLOB='#! '], 0x13c) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/56) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) recvfrom$unix(r4, &(0x7f0000000080)=""/27, 0x1b, 0x0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e) 08:52:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000700021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x2}, 0x0) 08:52:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xe000000) 08:52:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x4, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) [ 1972.287879][T11503] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 08:52:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000900021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x3}, 0x0) 08:52:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf000000) 08:52:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x8, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x4}, 0x0) 08:52:11 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000a00021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1972.742822][T11630] __nla_validate_parse: 16 callbacks suppressed [ 1972.742831][T11630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1972.840361][T11634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1972.911104][T11630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1972.942136][T11634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:11 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x19) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:52:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x40000000) 08:52:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0xb, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xa}, 0x0) 08:52:11 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000b00021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x10, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xe}, 0x0) [ 1973.179760][T11649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x60000000) 08:52:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="580000000206050000000000000000000000000011000300686173683a2d5f6e65742c6e657406000022096f04482f8c6e73c1ebffc8efc038f75089460085c1ec550257a387b991ac9100020073797a320000000004000781080001006000000005000100070000000500040000000000050005000a000000"], 0x58}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0xac8, 0x4, 0x80000001, 0xffff}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x90}, 0x4000) [ 1973.222886][T11649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1973.252752][T11649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:11 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") connect$l2tp6(r6, &(0x7f0000000080)={0xa, 0x0, 0x101, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) renameat(r3, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000040)='./file0\x00') close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf}, 0x0) 08:52:12 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001100021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3801, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x9effffff) 08:52:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000540)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) statx(r3, &(0x7f0000000580)='./file0\x00', 0x800, 0xfff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000, 0x4, &(0x7f0000000280)=[{&(0x7f0000000140)="7270ce78ad27b25720bedb61e07b3f88f2cf450681ec71dd30386df9c1f1b4724cd2a5598022054bac20fcd95beaa1130576118ca6dd967d767e4024d94538162ca343bfb45dc44c7c328be1dbd7b8e29a658980a3996eedda3ab59d01d95bea4a6681dde8c4b77c4b2f4571c198fc9d5dc75047d926223e9307d43c0f62562f4faeecea87e2577d35aea932815adb11829431314b8693aabc5bdcd55492934154c88e7cac01a899c97e0d194395f9a57a88cdb169da5e396d1a1cec", 0xbc}, {&(0x7f0000000200)="6a3b3670ba7a23258463ae91bf02726a4a6f9e9a3c26092428755f11d83d4b34cb2d9de31eafa5b755c5c7ca654e08544142de0cb2ad6bff302bdbf833656ab719007b6b88e799ed2e810fbc6a28cd576ebdd74ab9fc7545", 0x58, 0x22}, {&(0x7f0000000340)="a8ab7f15243b9bd73c7ac28428845cd2431fecfdae03006f18e2d4f0a58ce6f076826bd1094c85688b18dcd383135735c339fcff07a8cab221efc75f65f749fa20e800b1b22d939385ad662ae2f0765707fcb36849bdd8b6ce4ba3053a6eb43dd3347209c3ddcddff2a7a4883cd3ee3d5c6d9cfa86680420733d6d68ceee38270ea396e1c8a6a0193b4386859b298ccdaf97e5af0b946e44debf1a930c623ef9636e1e2de464ca06f361ad3ee1623f9043d7c9dbb51737d2f3748cc2e1b3f5a5ea", 0xc1, 0x80000000}, {&(0x7f0000000440)="87f04acc0c3ca9b7c2e7b2165b8a04f132754005b1eb3ba5e27ce88cb8c986ff5e335d1a297b21c48f88960808f276b19c2bc02b25fbf57768f64bad4112e7449e341e16abc2a02a1e410023038a987472120e6f84e2932ff2dbff57e11f3922a1a0ac4a588a4ab81227f0b67034bc28d54f43518b055c76911cbde30aab2d6077ba2eaafdcae792c631ea1f2655853a1fb2fd8749f77a0c476089459733a16f5fa97b4bfa5a1a69b1e9870402a6252abdd12c8092a39a21ba182d1149e0f82b2008cd576fdcc07c91701b7d43a1f2972dd0ec1c077591661430df510630ddda5c785a5ca9171f85adb134b8a0da684990fcedcd4dc7739a55ff", 0xfa, 0x100000000}], 0x19c040d, &(0x7f00000006c0)={[{@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}, {@huge_never={'huge=never', 0x3d, 'syz2\x00'}}, {@huge_advise={'huge=advise', 0x3d, '\xb5{*cpusetppp0@(em0lo.eth1'}}, {@huge_never={'huge=never', 0x3d, ',eth0\\'}}, {@huge_never={'huge=never', 0x3d, 'hash:net,net\x00'}}, {@mode={'mode', 0x3d, 0xff}}, {@size={'size', 0x3d, [0x56, 0x966aad919fa3e318, 0x67, 0x6d, 0x31, 0x34, 0x6d, 0x74, 0xef]}}, {@uid={'uid', 0x3d, r1}}], [{@uid_lt={'uid<', r4}}, {@subj_role={'subj_role', 0x3d, 'cgrouploem1:+'}}]}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) [ 1973.571777][T11778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x13}, 0x0) [ 1973.656018][T11784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xc8060000) 08:52:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0xe800, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1973.711865][T11778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:12 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="008000"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:12 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001200021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x14}, 0x0) 08:52:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x3, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000001c0)={0x1000, 0x8, 0x4, 0x2, 0xd79, {0x0, 0x2710}, {0x5, 0x2, 0x8, 0x9, 0x0, 0x3, "5a926652"}, 0x8, 0x3, @offset=0x7, 0x1, 0x0, 0xffffffffffffffff}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x5, 0x100000001, 0x9b97}}, 0x30) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x1, 0x6, 0x300, 0x70bd25, 0x25dfdbfe, {0xc, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x10000400}, 0x20000101) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:52:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf0ffffff) 08:52:12 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001400021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:12 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#!0'], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x20, 0x11, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x1f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x10, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x60}, 0x0) 08:52:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xfffff000) 08:52:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r1 = socket(0x1a, 0x6, 0x5) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f00000000c0)={0x10000}) 08:52:13 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="3f8e3f32ca23fb20dd836130668ab498e2f93c38a3e0a300"], 0xfffffe33) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x2, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000000)=0x2, 0x4) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:13 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009004000021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x24, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1974.539952][ T27] audit: type=1800 audit(1578905533.150:158): pid=12035 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17137 res=0 08:52:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xffffff7f) 08:52:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf0}, 0x0) 08:52:13 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009005a00021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x1f5, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="490000000206050000000000000001000000000000000300686173683a6970000000040001000000000001000700000000000780000004404e220000"], 0x350}}, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x557cf249bd0816d7, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1eeb) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080)="1cc50d8d7e6febf5aca4fbdf0d7509a46db55367c61ab05382fc328ae6f69806436372d5e659f76b25fb1d885662a02a0554a29200189d7dfc9204de1165d7668e434a0c5ba94696a8550d9dd7", 0x4d, r1}, 0x68) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r5, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040082) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x1, 0x40, 0x800, 0x3, 0xa1ded8b3a4b98e60, 0xfc, 0x2c9, 0x40, 0x5c, 0x965d, 0x4, 0x38, 0x1, 0x9, 0xd4a, 0x9}, [{0xa137122178407f09, 0x200, 0x2, 0x8, 0x5, 0x2, 0x0, 0x2}, {0x1, 0x0, 0x0, 0x5, 0x7, 0xfff, 0x6, 0x4}], "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", [[], [], [], [], [], [], [], []]}, 0x18b0) 08:52:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xffffff9e) 08:52:13 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009006300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x300}, 0x0) 08:52:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x4, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1975.239703][T12284] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 08:52:14 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x26aaf7bb87934a81, @remote, 0x4e20, 0x3, 'fo\x00', 0x22, 0x5, 0x29}, 0x2c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) pidfd_open(0x0, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xfffffff0) 08:52:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x52}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f0000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x50}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 08:52:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x5d3}, 0x0) 08:52:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x8, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f00000000c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) set_thread_area(&(0x7f0000000100)={0x1, 0x1000, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0, 0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_LSEEK(r3, &(0x7f0000000140)={0x18, 0x0, 0x8, {0x1000}}, 0x18) 08:52:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x40030000000000) 08:52:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xa00}, 0x0) 08:52:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000400021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0xb, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf0ffffffffffff) [ 1976.138270][T12321] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 1976.179339][T12321] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 1976.206552][T12325] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 08:52:17 executing program 5: r0 = gettid() umount2(&(0x7f00000000c0)='./file0\x00', 0x12) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="ab44fed97ba1be9b3800000000000000bc5b681995eb35c3166c0bbc227499664b3cd37878671e484fa0dee5436fb0da6a1d7eceb7979ab6061bb2f95b0d67bb5a989b6d17c97dfb7a7b225b494842bfe9a8aa0bef9c126124a4bc3a7acee411e0f3fede046c659d28a13fbdefd073681d744f8dec8bc46f188feec083cf73fa85eec213117c4bb5c8aa0d3db8"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:17 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='# '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xe00}, 0x0) 08:52:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x100000000000000) 08:52:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x10, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000500021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x200000000000000) [ 1978.914738][T12345] __nla_validate_parse: 33 callbacks suppressed [ 1978.914748][T12345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf00}, 0x0) 08:52:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x14, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1978.975812][T12352] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1979.046588][T12352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1979.098610][T12345] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1979.099354][T12352] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 1979.156484][T12352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x300000000000000) 08:52:17 executing program 5: r0 = gettid() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/mISDNtimer\x00', 0x0, 0x0) dup2(r1, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x2c, r6, 0x221, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x2c}}, 0x0) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) r8 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000340)="d8e41dcadd18faf051ed8a53543be39305b4b8a1f2c241e0aae12fc959bb90da71ecbadb4f2da1abe2432d28fbbae8349fbc0e291134cdc056d8f77dc8b8640e9b8a7d8c091fe985920df548c18fc684cf31eb8caac8e22dcf63a60dfb94507dec4f8bad0931121a3c562fd3a32cc7006206429410ead6d68e8e5956882821affe9cb66155", 0x85, 0xfffffffffffffff8) r9 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xa, r9, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='idt/wireless\x00') keyctl$link(0x8, r8, r9) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x3}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1979.256273][T12345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x1300}, 0x0) [ 1979.427662][T12375] tipc: MTU too low for tipc bearer [ 1979.501121][T12381] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 08:52:18 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='# '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000600021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x400000000000000) 08:52:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x8}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x1400}, 0x0) [ 1979.760846][ T27] audit: type=1800 audit(1578905538.370:159): pid=12375 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17330 res=0 08:52:18 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x6fe1e96d487231d0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1979.847672][T12394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1979.866537][T12397] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1979.882534][T12394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x4000}, 0x0) 08:52:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xa00000000000000) [ 1979.947770][T12394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0xb}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000700021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x6000}, 0x0) 08:52:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xe00000000000000) [ 1980.187694][T12427] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1980.215500][T12427] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 08:52:18 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='# '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x10}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xd305}, 0x0) [ 1980.369450][T12444] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf00000000000000) [ 1980.497079][T12452] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 08:52:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf000}, 0x0) 08:52:21 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="23212059270a2e2c1dec2155f836d9dc4c72dbed8756b2f60b759fb17c6e0c9a864607fe10bffc0b379ff15c0890a158f307c7a6cdf4d87ecda50666cfbca054e9bc724fb6d0c018c77ca8ad33"], 0x4d) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x1000, 0x2123, 0x6, 0x6, 0x4, 0x5}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x18}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:21 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000800021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x4000000000000000) 08:52:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x34000}, 0x0) 08:52:21 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2320001971faa0762908607b0083a431efca3d62bdf8354157d79443dee2827f31469ab349c30b3274b8bb025403e38c18d144442ca654983eb334e3743cb05291a08ed8f17acd202b4124a760e0e4a0"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x6000000000000000) [ 1983.309070][T12491] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 08:52:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x25}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x400300}, 0x0) 08:52:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000900021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x9effffff00000000) 08:52:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:25 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="23212024040071aaf1633fe033ec92260097601f59b2d63c38f00ffb4d1ca69467e741e7c257568c2a2972b048bf78f9870950192cf8a22a23ebb57b4d9f8e0f69675ae49754c484dab49810b70033b615c4be16183a864d70b41b01191e2e8a2af394847008d9260c2fe3e4f2b09493b818e922e324673bccf595f60010e460a8c590a72ea231c56fd8ead5c82ad411e7b8f08bfc5fa936c51de9aba655f0f7835d61390c0ef6c8eda9bf7bd41c97bd45cddece"], 0x3) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x2}, 0x16, 0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf0ffff}, 0x0) 08:52:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000a00021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:25 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2320001971faa0762908607b0083a431efca3d62bdf8354157d79443dee2827f31469ab349c30b3274b8bb025403e38c18d144442ca654983eb334e3743cb05291a08ed8f17acd202b4124a760e0e4a0"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xc806000000000000) 08:52:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x3}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x4}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1986.506871][T12539] __nla_validate_parse: 12 callbacks suppressed [ 1986.506882][T12539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x1000000}, 0x0) 08:52:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xf0ffffff00000000) [ 1986.602216][T12544] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1986.707450][T12539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:25 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2320001971faa0762908607b0083a431efca3d62bdf8354157d79443dee2827f31469ab349c30b3274b8bb025403e38c18d144442ca654983eb334e3743cb05291a08ed8f17acd202b4124a760e0e4a0"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1986.776329][T12544] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000b00021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1987.018718][T12572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1987.036454][T12572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1987.069396][T12572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1987.094700][T12574] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:28 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)=0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xffffff7f00000000) 08:52:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x2000000}, 0x0) 08:52:28 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001000021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:28 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) keyctl$session_to_parent(0x12) [ 1989.962839][T12589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x3000000}, 0x0) 08:52:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xffffffff00000000) [ 1990.004424][T12589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x8}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:28 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001100021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x9}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0xfffffffffffff000) 08:52:31 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="c3718390dd4c6dcb1b4dc7f27117f21b1b4d36519d9e2ac511a35bf0892569f9a8638898bd80a624ca353fb8e01592309ea04e8aef7b902949af5824565126e833d1852239196a96a64cec1a6c4be37ee72e451c6003202a3ddcea8266d436f1810705a42730a078ca5a761729b225bef5d365a9ed0dcfd32234ebd8e316ce689667054f9b7e17de5de76853f270fbc8a23f540da4f03fa3f9b89ced3acf1e46582a96ad59e19e6e786b31ca8cddc4f7ec47a7b0ca994723b34de1380bfc1364bfb92e636f1cbbbeb4b3ceb76e2841e01ce50298f3e5ec68c9d8a695eb8e2d670172772e225cef3d2b2eea6ca32f59432ab9d94344b1ad0456fbbe45165e3bd01a576aa775558fe1e95e5036501bb065485ff720abea8f03e08c211b7b17bb6f0ee29535d7cde9fc734a245a41fc3a5f32a88ed5666e247d464864281bdc21d28718be1ff533b953588fecf0784804e33d6531aa05b9f981ea7785"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) keyctl$session_to_parent(0x12) 08:52:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x4000000}, 0x0) 08:52:31 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001200021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:31 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="580000000206050000000000000000000000000011000300686173683a6e65742c6e6574400000000900020073797a32000000000c000780080012400000000005000100070000000500040000000000050005000a00000058233396c7aa06dad820432d580b9d3c8bb5"], 0x58}}, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0xe, 0x6, 0x100, 0x70bd2a, 0x25dfdbfd, {0x1, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 08:52:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:32 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000000c0)={r6, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0xfff, 0x9c, 0x4, 0x200, 0x0, 0x8, 0x401, 0xfffffff1, r6}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r7, 0x52}, 0x8) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1993.439148][T12634] __nla_validate_parse: 6 callbacks suppressed [ 1993.439157][T12634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xa000000}, 0x0) 08:52:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0xffffffff, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:52:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0xb}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1993.492604][T12639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1993.525995][T12634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:32 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009001400021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xe000000}, 0x0) [ 1993.658633][T12644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 08:52:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x9}]}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) [ 1993.742960][T12649] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 08:52:32 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) keyctl$session_to_parent(0x12) 08:52:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x10}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1993.833450][T12649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1993.898053][T12740] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf000000}, 0x0) [ 1993.951068][T12745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x44, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4c}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x101}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 08:52:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x11}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1994.005204][T12740] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1994.044946][T12745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:35 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f00000002c0)={0x8, 0x7, 0x4, 0xe000, 0x948, {r4, r5/1000+10000}, {0x2, 0x2, 0x6, 0x20, 0x80, 0x4, "f958a494"}, 0x7, 0x0, @planes=&(0x7f0000000240)={0x1, 0xad, @fd, 0x3}, 0x7, 0x0, 0xffffffffffffffff}) fallocate(r6, 0x40, 0x8, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009005a00021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x13000000}, 0x0) 08:52:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8840, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b1605000000000000000000000000000900020073797a3200000000040007800500010007000000"], 0x2c}}, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000140)="889e138298f49485a4b61622ae52a79eb8eb297668ec43567d8d9f5c58987256f07cc480772e843e3fc475ec70c381ec42e719ee6fabd7bde57ae27aefd8eff29255c2aad39397ce3cbce20794fb3a50932265a382d87dc510e7d1b5fa1f22fe", 0x60, r1}, 0x68) sysinfo(&(0x7f00000000c0)=""/74) 08:52:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x12}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:35 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)=0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x13}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x14000000}, 0x0) [ 1996.581102][T12776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009006300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x40000000}, 0x0) 08:52:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x14}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:35 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)=0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:35 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x20, &(0x7f0000000000)={0x20, 0xc2, 0x9}) 08:52:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000138021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x40, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000140)={0x0, 0xfffffda4, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r2, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0xffffff93, &(0x7f0000000440)={0x0, 0x108}}, 0x4010) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r10, @ANYBLOB="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"], 0x74}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r10, @ANYBLOB="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"], 0x84}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r15, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r15, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e493de9a33c0d1325a554cacdbe157c98bf0fd2c02e526db7e282df9be17467fcfd358fcd513ca5a786a8dff1d663acaa372b57142fd6a66ad381f9fcb119ea7b7853fa2a2ecc03c759ec1bb4050123edc3955bbebf9e9e91a8c124ca744419575825b8bad48be11521b30d3bfe10eb4e5f5191be7c04c10b893d956a6707aaa419b5f2c8f18b3f552da815eff05a975f45d16bd5542deb1399b1f041c5978c5f689989deb1ae5e2255779da15d0d687f0c59f5df7e67fde56835928a9bc6f9533cf66bd94111ce4969dc9f846d3c3c9bca01e241812b83bd18133a644b74ccbb"], 0x74}}, 0x0) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r16, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r15, @ANYBLOB="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"], 0x84}}, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r20, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r17, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r20, @ANYBLOB="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"], 0x74}}, 0x0) r21 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r21, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r20, @ANYBLOB="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"], 0x84}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x300, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r15}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r20}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x8}, 0x81) r22 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/snapshot\x00', 0x100, 0x0) r23 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b40)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(r22, &(0x7f0000000c40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x80, r23, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x15}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @broadcast}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 08:52:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x60000000}, 0x0) 08:52:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x300}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000302021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x9effffff}, 0x0) 08:52:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:36 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000303021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xd3050000}, 0x0) 08:52:36 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100c0a6cbf825695cfd8209e851964086fa27354ffc633e1cca61dcf0073a91427a988bb446abf023396b8c52a01629136d1c740a8bc234067daf87f4df392f370e9d2e5b3341474ca53b5e679a983aea2337af7403fe63dd6e665d08d1da345656943f1c698a4859a805e112e0f14b6f86f218a04829fbdd98357509c9d7778a213cec54cd69e89566b010817436eb0e1c658c9afd55276829bb6a113736ddb95b8e52701d28e266f43467053b25096a89e136fc8319d5a015507fd2a5959ad242ae1edd7963a75c4b8c5753eb8759e0e22e144a2cbbc602a1ef01457a4877ffa3f95556279d0000000000000000"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x992, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000040)={0xc80000, 0x79d89de3, 0x5, r2, 0x0, &(0x7f0000000000)={0x9b0954, 0x7fffffff, [], @value=0x7}}) write$FUSE_STATFS(r3, &(0x7f0000000100)={0x60, 0xffffffffffffffda, 0x4, {{0x1f, 0x9, 0x6ed, 0x6, 0x9a7f, 0x5, 0x4ddd, 0xe}}}, 0x60) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:36 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000000)=0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x8}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf0ffffff}, 0x0) 08:52:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x800, 0x70bd28, 0x25dfdbff, {0xd, 0x0, 0x3}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4) 08:52:36 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000304021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xfffff000}, 0x0) 08:52:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x10}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:36 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:37 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x41cc40, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x2000002, 0x12, r3, 0x8000000) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:37 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000305021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 1998.390843][ T27] audit: type=1800 audit(1578905557.000:160): pid=13054 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17429 res=0 [ 1998.579551][T13150] __nla_validate_parse: 28 callbacks suppressed [ 1998.579639][T13150] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1998.594207][T13152] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1998.684008][T13156] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1998.751267][T13150] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:37 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x20, &(0x7f0000000000)={0x20, 0xc2, 0x9}) 08:52:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x4082, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000000c0)={0xaa00000000000000, 0x110000, 0x7fff, 0xdb577b4ed69485da, 0x20}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:52:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xffffff9e}, 0x0) 08:52:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x8}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:37 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000306021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:37 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x10000) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1999.006615][T13175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1999.033997][T13178] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 08:52:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 1999.068013][T13181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000000b060500000000000000000000000000090002003200000000040007800500010007000000a641b8983a42e32c054886ddfd064478cc6587b64722ee12e407e6107b66cde330fe6e0d29d2e8eed51772aebb3a0be5131d6bd1bca4e98a539fbbd8d82dddf6d67cbfc235e22f096a06fe0d25afda5b9cfe7094130bbeba613821040000b8ac83c5e3053904273a6a6e5b0eeb58a6c49fc1b641e787b553273c9011c2388f5ad2959679a030cd478c403109700d641babea0a67399a265a50c7700308462660e3aec40a8576c7bcfef870d92d4370dded841683752f640868701cee5d449f260e217f01ec2e71f43fa0c7eba33691979b2669b88387634e00"], 0x2c}}, 0x0) 08:52:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0xb}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 1999.121694][T13175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1999.156664][T13181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:37 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000307021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 1999.303254][T13195] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1999.338748][T13198] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 08:52:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x40030000000000}, 0x0) [ 1999.375261][T13198] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:52:38 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x20, &(0x7f0000000000)={0x20, 0xc2, 0x9}) 08:52:38 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a000900030a021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname(r2, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x80) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r3}, 0x18) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x25dfdbfc, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:52:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x10}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 08:52:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mq_unlink(&(0x7f0000000080)='syz2\x00') sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80, 0x0) [ 1999.797460][T13228] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 08:52:40 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x50, 0x3, 0x6, 0x1, 0x70bd2c, 0x25dfdbff, {0xa, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x80c0}, 0x8014) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:40 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a000900030e021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000080)={0x58, 0xfffff800, 0x9, 0x2}, 0x10) 08:52:40 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x20, &(0x7f0000000000)={0x20, 0xc2, 0x9}) 08:52:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x100000000000000}, 0x0) 08:52:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x18}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:40 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a000900031c021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x200000000000000}, 0x0) 08:52:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="f4fdffff0b060500000000000000000000000000c6"], 0xffffffffffffffb5}, 0x1, 0x0, 0x0, 0x4000}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff96) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000100)={0x0, 0xac34557a, 0x8, [], &(0x7f00000000c0)}) 08:52:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x25}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:41 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000348021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x300000000000000}, 0x0) 08:52:44 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:52:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:44 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a000900034c021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x400000000000000}, 0x0) 08:52:44 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) 08:52:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 08:52:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xa00000000000000}, 0x0) [ 2005.807341][T13333] __nla_validate_parse: 22 callbacks suppressed [ 2005.807429][T13333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:44 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='! \x00'], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2005.863093][T13337] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2005.888350][T13333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:44 executing program 2: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080)="eb9f1b095659f2b008e21a61586dd9fa7d18cb0c1ed06595262735a9bc2177b6884c79570a4d5f0ddee58ca655b42e8e0452c14c4bfe0a6c86fb302c2eba70aed3247bc3c47f386a60512a32e4dd93", 0x4f, 0x5, &(0x7f0000000140)={r0, r1+30000000}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x80000, 0x0) ioctl$IMCLEAR_L2(r3, 0x80044946, &(0x7f0000000240)=0x41a5) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0xa5001, 0x0) r5 = socket(0x15, 0x5, 0x0) getsockopt(r5, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000000c0)={r8, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000000c0)={r8, 0x100}, 0x8) sendmmsg$inet6(r4, &(0x7f0000002e80)=[{{&(0x7f0000000540)={0xa, 0x4e23, 0x480, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000580)="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", 0xfc}, {&(0x7f0000000680)="98662664e7adc2ee315213bc7230ac8d38a8c335e75199d9f3819ded83b2b3bcc065f58a705d6d1debcaa788969782b154b265684508b7a7173be3056f0a083db239e3aab7c7be0ddc76b0727943a20d38e507c955eadb4eb976e784422d4ffa37129169e7f72009e39e75236aa5ef1c8c9c9a2f0338db207821dc51708cbf930c605e427536e4eff8dc863c0ffc07469ee310a9afed30968d3d66bd9b629873a6e187512ef699b40a25266cac9be1", 0xaf}, {&(0x7f0000000740)="75f2a657491b84dd3e08543af733ea3dae353116d147b2422675606abb6539740d14d04db39221adc0e495fb994cb635bf20f3fef3e604cc5bf4066b6a11757b5525d789536621175c4f0e4880bd0eeaa4ab4a75b1e672bf6dc5d0982df298e0eb3032bb886cf9c7be2ea9c5fc264934c4f0481399d7ee6dfd221e561094511b0b9c91dd9f74fdc5978a5c306aee857363f135fe52c8aa72059d9ce895d44d7f282fea2dd17813a63fab34e5939f1e3d", 0xb0}, {&(0x7f0000000800)="fd9b384d2cf82952ed63f81a3bb5c0e61488578a6389aa2c53052dfb93b623b6685296a01b0f56656261194606", 0x2d}, {&(0x7f0000000840)="81fb5e320acc67fcc5ca02f0d6d97ea9359a6b7dcde7d410e7004b30a21b7d82a3fc3699869cc6704d1e925dd540dd9d47965e7b2a3b44820f4fcaeeaf07f97a02348f257a7ecf906bab30df5ddbc19b9282d3718ef4734b32666fa8693d01d4bdb4986d55e9ae7f1e40df311e00109198a3119fcf73b5cf7ba5fdfa601eb383e0ae65ad8edf4e102b8b072ceb4aa9ac86affa39cafb7414bc2c", 0x9a}, {&(0x7f0000000900)="411a5a0ebc2393a88086de13", 0xc}], 0x6}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @remote, 0xfffffff8}, 0x1c, &(0x7f0000000e40)=[{&(0x7f0000000a00)="7a476245a49122982e3b74e410ddac1c03ca2763b2dbe172cb47e273cb0ac7d68ebaeb1a7bdb05a9235d10c6261d5431742231eb2041ae055ae060fcfc2b6d0f69d184207f606e9f145329b02005598ed7d5e27c46aa9fd303e7f8a02e68858353e2645229025fe2375ec10c0375a3acdfd40ea9066c606aaa2ff804431678670f80587babd041a35b2b4cf27d305ff12d6bacb78dcc98b14914ef078aaecb280f11d84c8fd6e4a60c502fbb6bf86d71bfbe94c2954a60a5db8fa710a667db", 0xbf}, {&(0x7f0000000ac0)="ddd7c8efc6af903ba89550ca552761a8d30440b8cb90c57c3a001af76019d1a8faaf906fae09e328e42d34194ef4c0efee9d87f14924b39376a8f0f01c7f28f19b5bfbc7fbed3281127e744d2e5f3239b528153cbf15300f27a417cb661915cb89550c77d807bcff0cd3bcdea49ec4fcb80e38d1eb9afa3f69ac5804bcc92e39b9bb4750ab9d8bcd445231fa7e36badbd721bd67f643ec947c589a4ed7d1a27e148eb12b3e3ef140cbb1ce2c04bed080da8da4176558fd731482f317fdfa36425db8d55a718e653ee51cbaab680f082a8faee10d325be961948a8dff2cbd24383813b353969aa220ed6eb0bf4836", 0xee}, {&(0x7f0000000bc0)="ad5c77d62fd6af6cad3e0ef4a30b465a5b33e368f302b0cf84aeedfd3a2f522a2159d83f909e4043a21053ffe44ddb26a295ab64fc702257fb9bad79348b609c6efac3d61db14c66e501f2cee66216d89d1ca6322856d294863a88932d1ef865502a776df8e792a0c60255fc940cc018033841c8c7411c59d1519d7b6053e0c6fd6ac9a3ca2cc941262eca9bc7316d7d3eec4b0f03bb7d57d076720b97083a2639367874420c5ef71cd0a9b9f87e1c207cb2e0ff257e61788c36476ada9bc9e2c669929e0a86d3b397bc95039278bc9a5668aac089b50e3a3a9f4748711d682d7dfa8460cc6fc63ae14828bbd1e08c4b0e0f4fad46ae1211", 0xf8}, {&(0x7f0000000cc0)="8e039307b47fbe522699829ac11cd736429c190a3022afbc5a0e8d98bb6f22e1bbd37719ef61c7944d1222fbb5139a27550cba87ced6f29b7b9abbea32c0d270442c50f993b36f2d5cae10602ae2a966d5894563ac2c44df6ae36ee108d2dd6f648da5f6d96ee77c4b0db7fde33aee163cbb1cfccf2e40f026fd349028f191577c5d3ce0c558bb04d28d437c1c74c8b1b64c084d90566d18d286f310f7753f7cbe5cb6200a05303670c397322647c092f13388a39521013166a6c31fdc6c69fe09eb31344436b872f53034a50590579c6180a5241fee3e419a5b0a92a76f766134c88f30cad3", 0xe6}, {&(0x7f0000000dc0)="bbc81fbb933e5c1077abd72475cea522eb99b3196cdbc65f75adb8ad097606929adb2b6bac0366b73082a79566aafc9118da4d4c9048dbf4131cf398d53a15145782a11a", 0x44}], 0x5, &(0x7f0000000ec0)=[@dontfrag={{0x14}}, @dstopts={{0xa0, 0x29, 0x37, {0x21, 0x10, [], [@enc_lim={0x4, 0x1, 0x4}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic={0x2, 0x69, "64890d470705c8fecffecfdba1f29d7b673e1108a31b0f4092da8e47e1d2126fd300510d514f6f4ebe87829128eb506c0d471d29068081c43d77323944903cca3963825a04200042b09a77b72142e641aca5bc8b1a443683d35af6f9680d6320738fbd26ab625ec795"}, @ra={0x5, 0x2, 0x23}]}}}, @dstopts={{0x58, 0x29, 0x37, {0x0, 0x7, [], [@hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @remote}, @hao={0xc9, 0x10, @empty}, @jumbo={0xc2, 0x4, 0x1}, @pad1]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x6, 0x2, [], [@ra={0x5, 0x2, 0xac}, @generic={0xa4, 0x11, "2865350c6eb71f3758003920ef31054af3"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7fff}}], 0x158}}, {{&(0x7f0000001040)={0xa, 0x4e20, 0x4, @mcast1}, 0x1c, &(0x7f0000001440)=[{&(0x7f0000001080)="6efef9490617ec8ee509264c6e6ccfb74a007ffa9fca65bddcbaf6cf91f95a4453cc4a1c05927a8ce85f987ad517ea835946fe916ba5780d0505a64d02c0701908cb992d9f4a99901aa611e48eb7869761c0c5fd2a9dd94d4ab0289ca58a89c36118a19f", 0x64}, {&(0x7f0000001100)="739b1db87ef80bf4db1d0fc5821a3daf703704a988bd8dc4cc17f28860ce11a3da7c201ef7cc2ba558d1016a8427a464dc2cd368cc9b08164cfea4a2f67016c47866a7770d10dd0cfb", 0x49}, {&(0x7f0000001180)="be6c5fde615477373fc3d0f572a3f3814a0f7db369023f08e41f0502f2c290a28a6900d81bc1f951f86edf863f119fed90fbef325f68b0c4f77d7cbc47f2128c54e8ab4e26fe3ae81f81f012d605edd2dea660b601e40f3e54efe7771953ad3f93a411a993fe5b6a5a14fd9c9a8b7155c4b568e921511b1707473dd17fba22716d089e4593f8c426f8ef83cf978ccf4c912b47d0e4ba096b5d7e8568057fb2c72b457a98e621638205f7abab1e6c9bd6", 0xb0}, {&(0x7f0000001240)="3ff4fcd1cf058fbc605b891e52c453b49961e35a20efdc30552a8b0134bbe7168d2430f703d6f12116d1131ef7505f9d0f72b61e13bc72336ab661751c79c4b97ff2230da57b3c6f08685a4ff412442e9e470a8e92c7791e24292522b53282aad6109a98077309fc3378cda713818cbf182a202382ee25ccaabe7ddcd4d80e3d5ace142a07b519e16f4366bc024b57911bebc138058507a96ab1078a81b7a2210f3406c0a07b342e3a49537d6e", 0xad}, {&(0x7f0000001300)="ee2d5712e23a0951529aa20b8f4c5bc85c6368386d93c049090b51aaa9adc5ee88d95256650b20f90ee1daa864599c5130157c0f59e5d7815103f8754577a2269b8886ad78adb078e9d70378fbce4231087def47aff172c762f51fec9675a4ba6b1baff3a161ffea00b427d43a5756cd4082c17cd4f606c7b3ae708a92a0616024932ad6450597623b1e9dad4b979bf82e2a19c702a173f9cacc77277247169e07caa34ca94b05c5336a81fbef57a38ea13964c20d8bd26dfa4139eaa4d06f321a0e154321c401cec94a6a5508e193309a944b3f1a4e1acb257cbfe760fb7d731986a17df6a2bd302e6de808b372621b098192", 0xf3}, {&(0x7f0000001400)="6213a587e6b849ed16808264ab3dff634b2aa0de3dd4", 0x16}], 0x6}}, {{&(0x7f00000014c0)={0xa, 0x4e20, 0xffffffff, @mcast1, 0xe521}, 0x1c, &(0x7f0000001540)=[{&(0x7f0000001500)="3aa49df74ef08a164de387dc4101f366fc4d05ea782e4f652edbd5e95856f1ca53ecd859287f97c402689428913d85430ca0e0ecc506d95aa2c4ee0f62ee", 0x3e}], 0x1, &(0x7f0000001580)=[@dstopts={{0x38, 0x29, 0x37, {0x32, 0x3, [], [@padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @loopback}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0x74, 0x12, 0x0, 0x8c, 0x0, [@local, @remote, @rand_addr="65d8911133df4f8e9ccdfa4c1f173667", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @ipv4={[], [], @remote}, @local, @loopback, @empty]}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x3b}}}, @dstopts_2292={{0x108, 0x29, 0x4, {0x2d, 0x1d, [], [@hao={0xc9, 0x10, @empty}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x20, 0x87, "f1dc6125b5fd663d9347f83312c69888bddd1bf7a0006214102500bf34873ccba99beacc97ed911dfcb3b1085f7ea26d865056543da1f27d15ef4f1cceebcac0f1ff1da436a601f948636f4abee289efd7ad8a9235b8e30f29909b548df28d488c751e9f6e141f7eeeefe063091033abd460d768e0c787809179ff0bb9e7c23348148f68683c4f"}, @calipso={0x7, 0x38, {0x2, 0xc, 0xe5, 0x7, [0x8, 0x7f, 0x1000, 0x1, 0x0, 0x1]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x0, 0x2, [], [@jumbo={0xc2, 0x4, 0x400}, @enc_lim={0x4, 0x1, 0x8}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x248}}, {{&(0x7f0000001800)={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0xf}, 0x1}, 0x1c, &(0x7f0000002d80)=[{&(0x7f0000001840)="b8b16fd7080fd60f08ec0b9081204a1eb27521363d8ab4fa4260adcdbc17b6ff70874b50f8ae642478c4bcc709893d93fdf945311984ad34bf86423ac7d71db1d32c2ec976b64e6b5afeb2fba6601e77b2d729c90dc38e32e984d8363dbd303d69e7f3678aa851fb9a174f2ca3763f062d7aec4f72f88a1fecad3f", 0x7b}, {&(0x7f00000018c0)="6fa6fe6832797401d5623420f178cbbced532c8ea9ee70809bde61313db8f4e0887c3f17fdfcee78de0ddb9b4d5babe86f2361a89713c6f2d3b5c06d8957f24561815af723aea6aa", 0x48}, {&(0x7f0000001940)="c80d540143777ba1359e21ca2208b10d180d02528f8e7cd80cccb15dae406d140788208b2939027c4e249d7babd34aa2325f1ca909f12572218dc2f0e1d30620b372850598762df48d10af55c52b94f73a31ea2c17530ea9b3dcdd07a262450b753ffd5b58e4b04c8f9f82b846ae2c19ce57c0637cdb769b631903baec45f03ffc76c8cd4c89076dfbc4b30ce55cdb525756fc01bf7b315dca7705317069f5b18c2728ea9cbabebeee687b58670a77b0977d8dbfea6e7218f413750d4f1382c0ed10534a9b492edb85a4fd230feba2fa21b10e757e6ef6b3ab311774c1d7ef1b0223bbcde32fa44a2ae1bdeeed958244819c46a30e57bae1", 0xf8}, {&(0x7f0000001a40)="eb737c65ea7851998082e1b60e4c856c3a1bc8fff60de78c42f124db85b2694af52af97191d49f8d94cb8e9a36bfce00fa723da9d65156b65ed2179b107469d8368cce4984089a8d3047dc0c081fd3d0242bd4b09a466650cda664c273bf6667641afae97a7af5fc77415a37491d8b4711d5d67d0925270e9499e52473fba3d6a4b60a53af7a40", 0x87}, {&(0x7f0000001b00)="502d9aa37e62947d175d018bbb26c936c741b8dcd3cdc2e3f465c85ee8d71c4bdd2da77f00b490e56aab565f59e340a09b2a45093f6129bd8c823b6d5f8617fd7e6c6c5e262cfaba84d2090327d72a674d1c5b094f1bb3727b46a0ac1d586f94f520cddc743eda03f4c074f3396178fe20998b3e916c663fe9309a93ae40bce3148535ce93a580769269132ab2c7e1f029df1e41c6fa6d107efd1fe886b2482f", 0xa0}, {&(0x7f0000001bc0)="2ea0dacb91085aa2ce8d936e1c48cdb133bcbd78d880194423ac029ecef67844a8882fca09418eb70e608cd291c836042bce7a7b84b3cd79a79a6794452206f811e131896ccb0801877c478b06be324315cee9f55242ea859145b238cd9c617298991f827800ac860e", 0x69}, {&(0x7f0000001c40)="a9c6c34e27656e43678337107310c1bf3f63bccec88b2993ee77eba0f94914ee705986e0845d0857f32b7521965cb53c2551e8b9e48cf7a8d8e9a551922ec202f27319d08661e01940aac4ce7fcbf524b36fba1820bd5b00104dce9ef6a81e17eac653eb44e2a5ae43f9a54d9c1c23fd33bcde88f4b9ead470b79ac717206d2b2a562d7a4844a0f593f95357247dfd632a1e0465c33fea0a59b2781fd1f7fc31b626f8fc", 0xa4}, {&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000002d00)="7311fed0f8109f0b446994d65ba314", 0xf}, {&(0x7f0000002d40)="e1365fd65e3e89a99323a51c611ba7e2d3190dabd04f5b0b910122b3c5dd0a3eb50f9c", 0x23}], 0xa, &(0x7f0000002e40)=[@dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @hopopts={{0x28, 0x29, 0x36, {0x0, 0x1, [], [@padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x401}]}}}], 0x40}}], 0x5, 0x40004049) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r8, 0x5aaf, 0x4}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000280)={r9, 0x3}, 0x8) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000000000000000000000900020073797a320000000006000780050001000700000044bd85a0492fa195c4e6b31694a87b142214f6522a640cea863db0938ca681c5e047a3249c690556010d1072f9fd7fc2cc4fae1f38e68faea466c36e878fe194d83748b55f139b4f158bf5ca0acefb88a09b5ca6b14ece3a2cdb6d43d0"], 0x2c}}, 0x0) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x400, 0x0) sendmsg$alg(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="6a1f0559f7e177c58dc071e3fd07f8b1798d60593f89710a469ad2c26790373f2c3bf3136145b3394f3fc15de6a989215a429f3af3e2ae1c8d74c8f3db2e26def7db9241e75f90e91abd235d930025a3b197ee0efef9396ce847", 0x5a}], 0x1, &(0x7f00000004c0)=[@assoc={0x18, 0x117, 0x4, 0x4}], 0x18, 0x10}, 0x40800) [ 2005.931539][T13337] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:44 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000360021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xe00000000000000}, 0x0) 08:52:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x8}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, @generic={0x28, "43a638239152c5927375b9270425"}, @ipx={0x4, 0x6, 0x4, "ae4aefdbba2a", 0x6}, @nfc={0x27, 0x0, 0x0, 0x2}, 0xfff, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000080)='veth1_to_team\x00', 0x2, 0x2, 0x4}) [ 2006.309094][T13368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2006.337620][T13368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf00000000000000}, 0x0) 08:52:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2006.390805][T13368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2006.414196][T13371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:47 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000368021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:47 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='! \x00'], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:47 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @rand_addr=0x792e}, {0x2, 0x4e22, @local}, {0x2, 0x4e21, @loopback}, 0x20, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000040)='vcan0\x00', 0x9, 0x6, 0x1ff}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x2) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00$'], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) close(r2) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8243, 0x80) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r6, 0x8}}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) 08:52:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x1300000000000000}, 0x0) 08:52:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x10}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0xd1) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r3 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000180)={r2, r3, 0x1, 0x84, &(0x7f00000000c0)="9d181102714fcffbcdc738770c31b3a105d76d13582833c23736a9876a9b411225b1e27aa7921b802a90d239c381cf58d9092b3b0c8e202935c8866cd080547fa69b2fa4182916f1d83266c33a26b011009849498123e2fedc081b7ee392c6a27c3fadbbd80d7ec76e1b513fddbac740c45a1ff137613f0bbbb18535ca08008abd3a7707", 0x5, 0x2d, 0xfff9, 0x1, 0x9b3, 0x1, 0xffffffff, 'syz1\x00'}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c0000000b06050000000000008c435aad88e6601c7350140b00000000e4ff000900020009000000000000000400079bcba65400b9d665800500010007000000"], 0x2c}}, 0x0) [ 2008.935615][T13392] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2008.959812][T13396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2008.983861][T13396] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 08:52:47 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a000900036c021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x1400000000000000}, 0x0) 08:52:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x100040c0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x480, 0xb, 0x6, 0x5, 0x0, 0xffffffff, {0x0, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0xff}, @IPSET_ATTR_PROTOCOL={0xfffffffffffffe6c}]}, 0xfffffe9c}}, 0x8) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0x41, 0x3, &(0x7f0000000280)=[{&(0x7f0000000200)="138b0e291396bdcdffcbf9febc7cde5e9340db19525fb2614bcd3235f707ad2c5cf640b4df97457f3896b66885a6699ad7c3946816beb5cdff1dfefadf4e1ebcd59527d62b3a04c11065dfd7d1016e155816", 0x52, 0x943}, {&(0x7f0000000340)="e720b7828eeab898ecd0caaa2b9bc37a66c05ea32bc3492427ce7df4ab77ee9830440e50076a5a435646b001f6baecab5c0a51276956ea196d4b87543748c6f07c8ec808d85bc9d6e5bfcd39957c89c1812701c53b2d7bc7b4d96bdd8a86bf967587703004fb743ebf3dfb24b09dcfaf0c3ba1fdb439b5f66e9cb003240764b46c6bfa2bf60a7a2d9dc37c6db1c009fe16062b110c302dff74cb3b81", 0x9c, 0x7}, {&(0x7f0000000400)="1d5fc193bc31dce73bee7fe7bb48b437ebf72cb5241aebc9249139f1a910bd1428a81563bd172e68cee02f60f8d774465be73403be7c4eb297bf16507ea94900888c0e24d474d1703a02ca25fe849c8895c321353701465efd6a28766748c89b89eca3c820f68941c654f4fdfbcb4c1b6c6e788036f96b1ffee12d9694fbb5f293fa9848672fc05bc14e5800d5f94cb85f6513ee29b41c2f3657d76ae1221f31d1c335fd3e192622ed66031515de05e48c80d0db7dde9e83d5444e22d62e7581", 0xc0, 0x8000}], 0x2, 0x0) 08:52:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x14}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2009.237872][ T27] audit: type=1804 audit(1578905567.850:161): pid=13408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir426773138/syzkaller.bL3gKi/1021/file0" dev="sda1" ino=17434 res=1 08:52:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000374021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:48 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='! \x00'], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x4000000000000000}, 0x0) 08:52:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a000900037a021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:48 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x4b) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="238020bc745209a2d153c5ed425bc97e25283a0449afe41e47fe221e639e154d18751e8619b06cef9705288b2f4996cf8972a2fc67b15775"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) recvmsg$can_raw(r2, &(0x7f0000000240)={&(0x7f0000000140)=@l2tp={0x2, 0x0, @multicast1}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/190, 0xbe}], 0x1, &(0x7f0000000380)=""/4096, 0x1000}, 0x23) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2009.467139][T13422] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 08:52:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x6000000000000000}, 0x0) 08:52:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300141d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="b0fcffff0a06050000000000000000000000000011000300686173683a6e65742c6e6574000080000900020073797a32000000000440078005000100070000000500040000000000050005000a000000"], 0x50}}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES64, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES64=r1, @ANYRESDEC, @ANYRES32, @ANYPTR64, @ANYPTR64, @ANYRESOCT, @ANYRES64=r2, @ANYRES32]]], 0x1}}, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x101400) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000200)=""/112) 08:52:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:48 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) [ 2009.910917][T13558] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 2009.998308][T13558] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300401d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xd305000000000000}, 0x0) 08:52:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000140)={0x0, 0xfffffda4, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r4, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x120040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0x1, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x200000c0}, 0x4041) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKIOMIN(r6, 0x1278, &(0x7f0000000180)) [ 2010.328863][T13579] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2010.414254][T13579] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2010.432841][T13611] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:51 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="237020eee562b73614665b5dfa43680ae2af19ad7fbd3e28eff3c1f518dfc430885c0887700584c850e7fd45726df7ec4037e5a30a6b86f3a3ac56c91868a4ee40cadf8aa6331f423931ab623cf8bc366597dbd9db3807c978b26decec54bb3e8c8168c239ff977eeafb6c0df25b357767d0f39e067ad16a0a2e8a5ec0e9099a0c716748a1e8ba82593971a726d490349d0c523601db5c964ed86fad7f392b2339116d3736abde82d0f3fabb14c9632a039060277aa16fff26e0be360795af0f424f875f4ccf1ed9"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$x25(r3, &(0x7f0000000040), &(0x7f0000000080)=0x12, 0x80000) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x20840, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 08:52:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x374, &(0x7f0000000000)={&(0x7f0000000080)={0xfffffcf4, 0xb, 0x6, 0x5, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000000140)=""/203, 0xcb}], 0x2}, 0x20) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000340)=0x10) 08:52:51 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00090003005a1d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:51 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) [ 2012.571855][T13629] __nla_validate_parse: 24 callbacks suppressed [ 2012.571866][T13629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 2012.631713][T13635] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b060500000000000000c1000000000009000200730500e8ff07000000b8fd"], 0x2c}}, 0x0) 08:52:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2012.702476][T13635] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2012.743921][T13629] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2012.787898][T13635] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:51 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) 08:52:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 2012.855122][T13629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:51 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321205480e0d51bcdb7fa8dfa7b2e166d4a19081cac1c3f91a741b76cd347599c434f92de0efc7a04907313a773e3ae0781e29e4b7673c63b2b9c3bf388e2557dff0bd8876994f84309294d819acda9faba4e3e46e6be561b189e41fc1dc9ac5ee01e899e34e4cf2b7c853e704102"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x6, 0x70, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37a, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, r3, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x7, 0x9, 0x2, 0x7, 0x9, 0x1, 0x8, 0x9, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={r4, 0x4b, "062421c90eb56b7857a082f430f03457a8bd22abfecf9285ea3ee535bb7c1f3fe320f64fff9d677e00412990ae9dd4cee3281668bac10f778a26e052a92ce0e689803e3cc8d34f53ab17eb"}, &(0x7f0000000080)=0x53) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2012.912790][T13649] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2012.922508][T13635] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:51 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300041d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000000b0605000000000000000000c9000000090002007379ff3200000000040007800500010007000000fcd02826b986f663bc8c3ef65e1dc37eb5aa9fa5dae07b8cc7"], 0x2c}}, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)="a35f06fc3b932dcd07ec1f5b84f2bf8d21bfe3d6e83f714f8be169947c23e0b6d76d1fc5cf1bf9c10498c380ea012f118339f4169f5d8c8a02bce515d64504703c56ce807cd80e8b25397d10ec8a1a306272abf5415c167cf45da785ea22082730c3bd7021966421a7c76af109ab952c38b64c95478dc626de80779f477f324eda95a9a352643532d946a6561de00965f7cde15cd1eab5c3fa9f6f8b39fbc06519e875801522bcfeb544da4bd9c5e4b38f7e5099e3c8143133ba68e20fd091d7a060078efa123e05cb097269037f9d7eb1b9") 08:52:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 2013.277528][T13674] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x84800}, 0x0) [ 2013.322675][T13676] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2013.333518][T13676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2013.350305][T13674] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:52 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) 08:52:52 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:52:52 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300141d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 2013.675636][T13698] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) connect$pppl2tp(r1, &(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x32) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0xffffffff, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:52:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2013.728196][T13698] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:52 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a00090003005a1d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:52 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) 08:52:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x3}, 0x0) 08:52:52 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x24}], 0x1}, 0x8000) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r3, 0x100}, 0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="02000400090003000400080034b10ca3056eaf8864794e0d98e23967b4645522720ce1a46d3740474a0da09e97e01abd978cb453a22eea22e666a69b01e69e4c77afbe3b8d43fe789a074bd0a63e26ddab6299df80ca53953177cb7e428fc52420ee52a186923763a53fd5f8790dfc424dfc69"], 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0xfff) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r9, 0xc0585611, &(0x7f00000000c0)={0x67, 0x2, 0x4, 0x0, 0x3b, {r10, r11/1000+10000}, {0x3, 0xc, 0x80, 0x3, 0x54, 0x5, "a2646fb3"}, 0xe0fd, 0x2, @fd=r13, 0x6, 0x0, 0xffffffffffffffff}) ioctl$USBDEVFS_DISCONNECT_CLAIM(r14, 0x8108551b, &(0x7f0000000140)={0x8001, 0x1, "201eec001b3006b7edfd137003afa1bfcae0ade21feff9b3d2cdb8c53d146290159de9eaf6a315634e3dfecfc94336d037104481afc86716443400fb9cb893ca4bbf2b62291360f3376b2c3f0a60c42db80b07c037e495864f8b28253df434a9de61bc7929ea452b3157711bfb853ca79dfcf6fe4411f3d3475bcd0c484c57d10519d4c830cbfe2dc649391a1fcc6bb5a0df1f41faf18dbb734eca0a785c6c080e1297d35f68bdc67a38b6b6d7bb3bd6b6d818c8198f258507c8f0122d0c70ea86b88dcfdc4f4701ee0c076200762012efdc83163a1ba901c8705082845068cb2dea67e916893669e0899aedb3f6e1b0d8e84120173c920d911925cb8bd7dfe8"}) r15 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40880, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r15) ioctl$TIOCL_SELLOADLUT(r5, 0x541c, &(0x7f0000000040)={0x5, 0x0, 0x80a, 0x2f5, 0x6}) [ 2014.086263][T13722] validate_nla: 4 callbacks suppressed [ 2014.086274][T13722] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2014.175900][T13722] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2014.203485][T13731] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2014.212335][T13728] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2014.282012][T13731] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 2014.304439][T13735] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 08:52:55 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x17) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x48) 08:52:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) 08:52:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300025a8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0xfffffffffffffd71}}, 0x0) 08:52:55 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2381b53c21a60a0018b09a07"], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x48, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x14}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x0, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x80004}, 0x20000000) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0xf}], 0x1, 0x0, 0xffffffffffffff74}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x31, "e97d75fd73cd2ce700baca1aff72e7f6cb69668c0024f56f063c7a38f0d59cd1851e9980c6d71632206524421671772180"}, &(0x7f00000000c0)=0x55) [ 2016.938510][T13746] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2016.992503][T13746] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xa}, 0x0) 08:52:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x200, 0x0) fcntl$getown(r1, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r4, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x39005004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x138, r4, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x21}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5c39}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x2, @ipv4={[], [], @multicast1}, 0x10000}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x455}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x31}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x44d0}, 0x8836864d53f0e8f1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x20}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r5, 0x8, 0x7f}, 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000000b06050000002f75b7000000000000a301297ffafe2d2673797a320000000004000784249c0c9de6ff000005000000454b00000000ead55df344d2f8bf633bfc"], 0x2c}}, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000200)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x14) 08:52:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d850a021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xe}, 0x0) [ 2017.350976][T13776] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2017.477543][T13776] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:52:58 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000480)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b06051b74ac1a020091493c4a7df89faa0001802000000007002300"], 0x2c}}, 0x0) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00002cbd700000000000000000000800010000000000"], 0x2c}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000500)={0x248, r6, 0x102, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7329}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MEDIA={0x120, 0x5, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffa9a8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x66}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff7}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x962f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5fd0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc85}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x8004080}, 0x880) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x80, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x84000) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f00000003c0)={0x4, 0x3}) connect$rds(r8, &(0x7f0000000380)={0x2, 0x4e24, @loopback}, 0x10) r9 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCGSID(r9, 0x5429, &(0x7f0000000240)) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) fcntl$lock(r3, 0x6, &(0x7f0000000280)={0x0, 0x3, 0x101, 0x7fffffff, r10}) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000010610002cbd7000fcdbdf25000000070500010007000000050001000700000005000100070000000500010007000000050001000700000005000100070000001c4b0500010007000000050001000700"], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x20000001) time(&(0x7f00000001c0)) r11 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FBIO_WAITFORVSYNC(r11, 0x40044620, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$UFFDIO_WAKE(r13, 0x8010aa02, &(0x7f0000000400)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) 08:52:58 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8525021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:52:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf}, 0x0) 08:52:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:52:58 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2020.025607][T13792] __nla_validate_parse: 15 callbacks suppressed [ 2020.025617][T13792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.049539][T13795] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 08:52:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x13}, 0x0) 08:52:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2020.116984][T13803] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2020.125115][T13803] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.256324][T13792] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2020.276534][T13803] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2020.288802][T13795] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2020.290421][T13792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x0) 08:52:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2020.346328][T13803] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:52:59 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:52:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568041baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 2020.649061][T13911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.690919][T13911] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2020.703247][T13911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.729720][T13911] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2020.730324][T13966] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2020.742447][T13911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2020.763802][T13966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:01 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x60}, 0x0) 08:53:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:01 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000000b0605000000000000000000000000000900020073797a320000000005000100070000060000000000000000"], 0x30}}, 0x0) 08:53:01 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568141baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:53:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0xfffffffffffffd7b}}, 0x0) 08:53:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 2023.212640][T13981] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2023.279601][T13981] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x106, 0xb, 0x6, 0x5, 0x0, 0x25dfdbfd, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xffffff6e}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x300}, 0x0) 08:53:02 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d85685a1baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 2023.622270][T14069] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2023.669884][T14069] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:04 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x6f278a2c39a2c69e) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000000)=0xf0df) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:04 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x5d3}, 0x0) 08:53:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) bind$netrom(r1, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @default, @default, @null, @null]}, 0x48) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x31, &(0x7f0000000000)={&(0x7f0000000080)={0x3c, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x3c}}, 0x20000800) 08:53:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568025aaba20400ff7e", 0x1c}], 0x14}, 0x0) [ 2026.228670][T14080] __nla_validate_parse: 8 callbacks suppressed [ 2026.228688][T14080] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2026.263777][T14083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 2026.299938][T14083] validate_nla: 1 callbacks suppressed [ 2026.299947][T14083] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f00000000c0)={0x6, 0xa, 0x4, 0x10, 0xffffffff, {}, {0x1, 0x8, 0x1, 0x1, 0x40, 0x5, "16308ed2"}, 0x1, 0x4, @fd, 0x6, 0x0, 0xffffffffffffffff}) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x54, 0xb, 0x6, 0x5, 0x70bd27, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x9}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x6}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x9}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x4041}, 0x100d90d0) [ 2026.386521][T14083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2026.497163][T14083] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2026.536703][T14100] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x9, 0x6, 0x500, 0x70bd25, 0x25dfdbff, {0x44785db35963d9af}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x1c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x339}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xffffffe1}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x2000048}, 0x10000000) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f00000000c0)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000000b0605000000000000000000000000000900020073797a32000000000400078005000100070000005620755c112998303179c55bc4bc704d165d967abb9584b3aeee94f2b206fff58cf6c841b61b83fd25ca9dfaf6ed0300c95389609ff7a93719cf"], 0x2c}}, 0x0) 08:53:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 08:53:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2026.613254][T14083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2026.614706][T14100] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:07 executing program 5: r0 = gettid() r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x4e23, @remote}}) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:07 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20200ff7e", 0x1c}], 0x14}, 0x0) 08:53:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 08:53:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000340)=""/4096) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:07 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2029.381648][T14147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x1300}, 0x0) 08:53:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2029.459631][T14147] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RUNLINKAT(r3, &(0x7f0000000200)={0xffffffffffffff39, 0x4d, 0x1}, 0xfffffffffffffe42) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000000b060500000000000000120003006269746d61703a69702c6d61630000000500180003000000000000000000"], 0x30}}, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x100000001, 0x0, 0x10000, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r5, 0x40106437, &(0x7f0000000140)={r6, 0x8}) getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 2029.506333][T14147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2029.553866][T14147] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2029.626297][T14147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x1400}, 0x0) 08:53:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20300ff7e", 0x1c}], 0x14}, 0x0) [ 2029.753950][T14191] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2029.862286][T14231] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2029.983610][T14238] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2030.001083][T14238] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2030.014389][T14239] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:11 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20500ff7e", 0x1c}], 0x14}, 0x0) 08:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:53:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b0605000000000000000000000003000000000000007a3200000000040007800500010007000000"], 0x2c}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000180)={0x1, 0x0, {0xffff, 0x2, 0x302c, 0x9, 0x5, 0x2, 0x0, 0x6}}) 08:53:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:11 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:11 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000240)={0x2}, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x100020) 08:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 08:53:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2032.505849][T14254] __nla_validate_parse: 4 callbacks suppressed [ 2032.505860][T14254] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2032.512141][T14255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2032.517400][T14255] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2032.618104][T14257] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2032.666674][T14255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2032.704530][T14255] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xd305}, 0x0) [ 2032.724776][T14265] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2032.763078][T14255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="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") r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x80, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000200)) 08:53:11 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2032.807694][T14265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:11 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20600ff7e", 0x1c}], 0x14}, 0x0) 08:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 08:53:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2cff00000b0605000000000000000008000000000000000073797a32000000000400078005000100070000005f1c2d349496b9ef4e7465254d8a34f0eeaaa7e680f63f22be4a6e45ff28f4abbbfa037842cd569c21d898317f2f277307d7917d47d15e0916557c33277b6d4752bd5f4c94108d06286f9970f102202595c7fc1b45ecab53fe6e76a1a60a1e97009bc658e48050ec95114636d7ffbb40790919c6cc1e26f6f58893f3a304843cf6eb6c35e6b1fba52d45c0f5ba"], 0x2c}}, 0x0) [ 2033.065829][T14284] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2033.081764][T14284] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2033.137703][T14284] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2033.204278][T14284] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2033.221204][T14292] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2033.248676][T14284] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2033.275636][T14292] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:14 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="232120072b323bbc4cb8d692e79487071e30c940c14deecb84970b8ede8e415fa4349b924f0a72a9d967314b6b54d757e5feab7b178352d60e267351521f346d3472628e07a370ada79b11326887264cbfbe960dc31afdc349c7a1447aff5d9f43efeb32619c08105009e1371208b03d30ff52128e85d60938cfa91600"/141], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0xfc60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pwritev(r2, &(0x7f0000001580)=[{&(0x7f0000000080)="10065666302a2aa7b4b55559f901121e397ee559fa92db7982f5ad7521f969aa3793d310ccd9", 0x26}, {&(0x7f00000000c0)="e9edf926db2dbb30f6aae614b5c5aaedd11642f378f510ef75808574a1ca682fe376813ef77401f17ee0a169c0ebe38e1b6347641225e3e1402384668f9ac2aabae7cf3c819b39bdedbcbe1688900f88fc6e4e5641f6f28b2563a81cf4b2039827e72f330cbbc8b7a58bf8bd42eaf5e51420dcea0bd65443865e7d38b9ff402c6bb7ee73eed43fbffcc5ce8f464d86", 0x8f}, {&(0x7f0000000240)="18b7ab5954cbdee246468e0bde29cf3e1e71b94115f3", 0x16}, {&(0x7f0000000380)="d0c7f6118d818418abc65dbe44a48a3ad8e20b836de87e490222608a1f522f7c6d71581646504ccc85e1ce16a0b40fccb92b6c8376a7389b2abe570139d2c208ed70dc4f44e9996ac5b090bd5f206214eebcbd567182775cefe7ab76be15a37fc283f0a86e1a97c928ee599964f65bb72c6c45ef5a4d92946baa41385b22e66f9c73fab4523452cd7af79dcaebbd7679949bc58890170e4e204ad715b1f95542a671de26538ecf7b7b7c6e4331ea1fa7fac5d587d0fbd6", 0xb7}, {&(0x7f0000000440)="7c6975089a19ee17c819ef0b706f5416faa49f4329b5b9cbefe216e17227081c4792a0fc5df064ce41065f5c34f8afc1dd9fc3570753ad1d87ad2b8378a867c21d022d33102db29b6563c4277bb936f50c1724199d250af0fb634600e4131f4e360a77ec3f9c6d41", 0x68}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="56c53d5d4e6919d0c02d5d9ef20e81cde275da17", 0x14}, {&(0x7f0000000540)="c994342aca22b99623cd8c5b60118adba43f00788d8c75e9eb7c533566c798ef0c2ad703436fde412715f7f23d66b13e731f052653", 0x35}, {&(0x7f0000000580)="491188240cbb83921fa406ffb9eafec030c475d1523fb1881799c71bae6aa88e4bcf8c15d649d116700b6f14487e3e8d30478af40ea98509221b79b46d0f4087f556a9379e39dcd1345cbf6fc258e63dca2736796cdef68e0fbab980f7fc658dae67c817ec2380e49375a4ae7dfe7a29d73a2dff29d3c381c47fff90ebc1462c71794bfb9b8d80161ddc3d2d10a99ad2cfe95eb4a92891db2c22649efe8aab57aec6f2bdc3bdb0125a67f5e5e17766dccf1ff5a27a91d56978566d81979d871b1a032b05fd5a1337a9170eb4ac7c092738793cc9a6f5ab227c579f12549961d807dc0ea14f8ae641ac6c3612060f118d94b2da12790a51d3c8ee365a712bee28434a75821290952dace5771b6ca485b9e72adf9ec5c1cb504b4b108975612299ebef1b770a2401ba768776165f98041353fb604a75f7abe5042dc9c686cbf69b7d17f300b2244d04cba60c222287a609b0e4b0429b949593fea1a2aeca10eb7aa874696fd48ec5652b83b56ed32c4e3307a6049303a99af9792e3b2d3f950cc949211143b122280527355d25e37a90c1a7ede78e2c85ac2710e2b2c5fd0b8049133866c82ab2c3aaca44ea7d8d0afb1aabc4c1975d07e765cc2557d7fbc2ea8ee5eb66884277efc5ce469874e0f4d27fcbdbe1cac8546167e5c69fbce030f5b18ffa973ff7da06d9d417bd02d77b141a0efce926c669280c4b9c68995806f324ade2e9e489664aee410959682a9fd2027f0988d3d17baa66eed943160e7a25539c5c05f768a1f794e48075daac2ef74567774b7c899400a6fa770003a3d481f090a731c6110de7b710db310c36640d1eb0750a31676362c123d0cc605b10e9f01a3809bdfe1f26b43804a15c98c8d01c3f1e45bbae8617dcfef29e64d97cba9a0393bbdbdcd4c00b05e94384ac7d233c11d31520ed362b4a21a1eacb3423018618512586c80857e184d052741ee4484a714ab1d3a72040d26583c4e27af397aa8274dcadbadeec7adb70d4d5d576ebc2c913eb8f5b06f8b345cdd68435272044f916d77c57486a7f4422f3af667b02c49bedaf406788b532fc39b5bc8d82d3c2e101baade4767b827440814911bfe3c343a38564765fcfc244ae8bf006b1baec06aa0e852ee4b3537efc8ef09317a15ecdd926aced14c473ec8392ca740d06ff2276199a066fd6ac1230890612b56215a26ab9abd163e0afa64736a237248d516826f71dc1fd900ea69bec3804e1cad11afad7cf7fc96f72ff488d16bdba62bb0b5a9550e0b0418d637409fdfcdd8f0e9663de30d387bac538cfafc950a219a05404d4c8443a3bf7f02ec30d52db2db16bc893c01b5d9c5583267f1d84095ef1bedab986626c866b551bf2970ec8269e508607e05655d865a8179e146be13f35e3da579db2840c20e9a3f3b9fec6e8c832e1a5030204707b62f6e7f1bbe6c416fc01b6d9f22a338077e6b743c6889d7e87a29818b4cbdc47a8cb177d0bfb4ec8aeaa2cc8db65259e08dd226ce5d93185c8e775d7da8f4c98191db86f2088c8315964181e86f3ed998aa9866945892815fc0b9cdf032e7c21497acae20c06d90ff88b4f43111b5121b9ffb0604109270c5af1f9c9996b637fe8e9b2fab32a34662d20f13f70765d54f275233a45b500c93356d71ee5e0563b046378add27ecd20b6c729ef3eba3fcba169dbe62e5dc0c9155f353c2ca7fb5ec7bc8e1f1e3ccb48ea748691df4212d459248218e555259d0f0495670c7948845df37fcb14c86329320c62e4b41760dd4feb9b4a918e1e5009f9fb44d4decf2ec1d36e28ddff4d011a57676d0c59e6f44cb56b05d504303560aed45dfa32fd99033bc931365e321ff3644f53f6a145b7b87ca1ecf4f7bd17db9a3a88ced4186a6cde615893061d2a9c9f64cc1f450f90bb0dcd1fea234d631e09a580a63b26e9d2406613ec184b0916b7b880567fb1f062cac3dba1efc91db37defc5a3e1dd96d044f0b612fcf62db6697627ad4cbee27b77da45125589014054ccdf5335ea49d7853f98484cb523404cf1dd8ebb8c686c8e6a8b6235946f8a6f72fb531e69e512d70c120abbae29ef0d7cf639bcb6a2fab4f59300e80de643c143055b4fb4121de73a40d3481030f8a55575184e06acf967f17ca8a3d7f98d103d356c6fdc99acffb5ebedaa2f7355ddc13f7f0fd5bf5c84e1c1030bb1b8caad1783caa8ae691bcbd2ef0f34f5ef0f193436c9809e52b4f6d3d7f95dfc82a6fb44a6a8ce07eecf56900dce332ca1f23337ec0cdbf4020e5f98601f7ccf500b41a366d190c07186a3ff8805af3a4965d4e298aadabb9dd089842c9b8a97d3abafcf6d4c32c659bc7a48ced6f0b878c7df46cb2ac87fe674f3b0d5904382be142b4051b7f9e5d8ff34e6fbcddb86e366587252d241ce75f35eef85217062b12fdd2cf40c0bddd6e2367076913c458cfbdab38416a53f22e4c2384e1c32c7091ae9d616629d3b9e8cacaea8bd354f3b063501b47cb9a3a787412180f5d4124487cfc43a556e890b107115c4fa76c38dc0b6007befab3a7d0288e5e449ad7444d38a19ede77b6e9d7ceaa3fffdcf539c2c503ff7c5dc7d088e9de4b74434d205f4a58141b01204fc4633c1e7a05c872f8e08dff9bd08ac56da6ba1229bed84359aed770bcbdb09b5d67c87765f6c7de9a773afafc0b8840c26f1a9d48d36e59af83a31ddcba873bfd999baba8acea98b37fb02c60f91e97fd65d673cc5940793130267159f4333ebc5d54b43dbad6e1f5e79f86096c68aa1e6cd53d11e1a3fa5ec0bd8198ef82ba0b65972dc9e6c7a7968e85e8274bdfb3fa0a61112665b59f80aea9f5665f43c0f67d5794a4a125f7e7291118463217fb71666f2c1fe47368f8fd21455e966027b2cc7d96accaaf7529178ad53f6e2d7f5997bfc77f98fe64efd33b1539959904d540e9bf09ff8d66351508153aa9d1d6851717da4e70bb6975d70569a477aee9aefc8deb7ff5565cbab491a998fb7bffd6338b06a8b77561440cb3e4b6899a259568f568ecdca61da135c2df71ba19b653ab73d8b8111244796bff679586f22a0d8f8e1b8098326f5b42c71fb5d69fa28b6ad71b417875150867ca1aa95167fb9d6666b3570f235f9c74aef73f09445414b5e356abfabfe7a6001dfcaf056381044e55659805964a47acea383f34995fc2a3a860e66364025283856aab53b17b7b9e974e8021ed421d751b5ca1fe5dab00317ab098ecdd174a9b3e2c87e48f97fecfc61c09c842a9ce70125e696b7dcf6da1c4dfada2e5c262fbd6dba5ed4b8ba2c0af18eb33e1be129b0b8c8f9d97c75108c5cb7226701f14d2866e4f0e63ca915001a3bd93746bdcc5f24d254ea2176db1148d38b119aed9b6f84700819c2d06f79fcaae14f0417cb41472ef7a317a4e23b74a03c410f34642d4a1472893f1750deb73b5bd5ad5097d6b7bb56d577b03dbcb026eddb881a9a356e210e6265415b779511119fb7df5865755fb3426d5a2477890623f527d0e63e56ba4ff94a1bbdd3d495d63d94a5ed10b1a08275635f02eebae38f65f35ddeacac6e2b67096f96e5f411dc10c178202aff653c9fbaed1520253a7c0ab2e7243e66550d53d0a0864e5b87b7fdec30eda213788f08eae04c40cd80dbdb2916a8c01ab3dfc158924f4cf8eb6754a7c50f8d40e178591459603d1c57e90d3626ccc8071dbc35e9e34b89d7a7ca81e674825eacc9056f9e521007c1188210c6d690e0b40e3956664e3eb47b157e83642b6549c27b53df0f5c4b6bf0f639c79e024b7d95e08788f06bb37d2b149812a56184e580f5b190f19189ce829f47116c0bc1ee71fe35457067781c73b07c53a73464b5cefed9cd60c97a0be2208968b3f7ab97b1ddf9559cc3e97b0657d185cf3a2c1435715cea5f84d2fb5f56a7fb842b64e489090fa4153c58e4a6c366b65aa78950a709d7268fbf1c079a0c982d6047f4c2d5957cbc5890548156962cb203793213b256ea52941cfebcb91b32b5774d31cd6c03cfc7182fc5a2994ed93f7fa3e54b440efd75be83ccd55a5e22a77acffe6538f51c8f11cd43d5251f75be2e0e788293270297e5ecfbf69366749cf6902764262a12ffef8b4e71c75d9dadadadd7b5c74bc6154c406a8baf5643daa993e9d203214f0b993b673cf9a43555a8c7b203458eb904fe00f810354e7b9a03f289ebc970dced390791a3095cd68dcf386ae5c0c5e957bb4b79c1efffc2164042a3e925d7179c9dcf4276b6c3708e7f7e38f3c5a98010fa7eff5e1b4298e1b933677728a8fa9b02b0628a36ba2c554c1c011c9fe0df875453f8080a949fefd1f5ddf871b56b3d68eb37b119acab500db9ad692188d7ea167c08de877a8b5482eab889ce0250346e52efd3529058c65b655de36dee7833271b1d808629b4cd9c5e4f91b9707507e45468c1e6376fe31f9bfafdca7494d77d27ee680fa22928a6524dded7a07ad3386c3b577d4b6360cce4323adcb632fcdf3bcb1cf2a239c6c3556ef269a70c1ea79c8c637616abeba0b8212ab47b7b6365f9798394e3b16c7c7590ba2102c3a3e8498acfb700d0620e865136b4cfe07a3f4a0e53bc8c6c9c645f191ff3fa1c4fa6f900f5d76e822641a58b666578b627f8e93a326df08b0e90cafccdd34d31717badfc2b72b4553e423e19e76dd938ec2c8b7ee5297dcc98600d0a721ad5254feecd6f6cb987e7462335aaacf64b83cc06e2f71ad1a3145f47b9505f471bde74ad00f70f3559ff5a8faffeeefb2aedb0b8414e4f29f98bdcf1c049e7ed7d938e6f7fffc443eddf0f7426aef79b919705c7015c02cd7f64cf2b145dcf934630ed68d2a845fe3c542ca1d8660035c2f30ef03628f472af00daaefeb19e3eac7e4b2ca4de646bcbe2b86aa9a0b300661ccba17372e7c299be25bb9e1d591fd00b8c31a8ce9fa30aa1e07af4f723e1249aa98fe4401d352c9cc6f236ea7761c7cecf068ebcd6b15939194a3c14e16ab90f69901185af4b1a492cba2a788f87b5844f625f2533d7a24633d543cd415c8d512f7174bd3179ee4e5931cb2ae35849c772f3bd2f8741ff0b9bd1cbf3ca38042de19a688f5f6c7c9d2789c71fcf830ee7219b4859aede423193de80ac1508c82bd8f3ad5e1351ce3ab98ef6262696f5c5ef601bcb8509554ed8f8f3dce9c7cc04e7e168880a58e3dcb004521f20ad07cefff0feb275ae79cf7288d87e7f586a30466970b030c08a91d6175962340286f66161e00a7b85ca765c400be11f8db7dfa5674924658e1f997f17ba3a5a23766d011f0a34591e317cdec1b59ce8cdb4a789b42011de41cc324833c8d3cfc35cf8d216ca3bbd69988d69aa2471c72e93c4ad0ad1abae79ea20fd6fb82e7d8877d8b7051c74fbc5f706e9e5db542c0a0219ea48dce3ba17880ec3a866feee4420303a79fc43743149505ddf8202deb338c407bc0211eb14ae9b70faeaeae6c55454d3db9b5d66cdeea2dfcc142d84483935df0ad67bc69e6950c25dda4e80633939a685efd8d0c7a70c7df8a8de9300cee2f17bdf01f403d6eeafe50366f7bfec1bf3b550d442913f2a00e6aefe166b30d3d4e1e7198419c2d9172bd837c59a36dfde466080e58abfe4208516475d5fef37aea2af2f347411a7681c8af2ce9c21454f25660d68526d2e0da6c6b2d5ecba7b34027b0c02d98200a7f21e852f2efda1105b5d66101b95f9d42199c80891b76be8093ebfad6d6a733b675cc3af74acdff052e936167a5ba38aa60f6b2fe4a5427a2b77043795831cc188033574fc168f4b92177b86c5b96989b8a0", 0x1000}], 0x9, 0x8) chdir(&(0x7f0000000040)='./file0\x00') clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x4758, @empty, 0x101}}, 0x24) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 08:53:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20700ff7e", 0x1c}], 0x14}, 0x0) 08:53:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000080)={0x1, r5}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x68, r6, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'tunl0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x10000, 0x1}}, @NL80211_ATTR_WIPHY={0x257, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'ip6_vti0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x2f}, 0x1, 0x0, 0x0, 0x40810}, 0x40000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x40) 08:53:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:14 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 2035.574454][T14316] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2035.587869][ T27] audit: type=1400 audit(1578905594.200:162): avc: denied { create } for pid=14309 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 [ 2035.605744][T14316] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2035.646549][T14317] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:14 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', '#*vb\xa0\x93+Q\x14\x87\n\xce1\x14H_acl_accmss*]selinuX@\xbe/f\xb3&', 0x20, 0xfffffffffffffffc}, 0x30d, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2035.704848][ T27] audit: type=1400 audit(1578905594.250:163): avc: denied { write } for pid=14309 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 08:53:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b06050000007a3200000000040007800500010007000000"], 0x2c}}, 0x0) syz_mount_image$cifs(&(0x7f0000000080)='cifs\x00', &(0x7f00000000c0)='./file0\x00', 0xdcd1, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100), 0xfffffffffffffebc, 0x5}], 0x83020, &(0x7f0000000100)='[)\x00') 08:53:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba21200ff7e", 0x1c}], 0x14}, 0x0) 08:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 2035.925022][ T27] audit: type=1800 audit(1578905594.350:164): pid=14326 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17545 res=0 08:53:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:14 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="22abc54a9abe"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2036.009178][T14349] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba21400ff7e", 0x1c}], 0x14}, 0x0) 08:53:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 08:53:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba25a00ff7e", 0x1c}], 0x14}, 0x0) 08:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xa03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 08:53:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20203ff7e", 0x1c}], 0x14}, 0x0) 08:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 08:53:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x2}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x52}]}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0xfffffffffffffe66}]}, 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x58}}, 0x0) fcntl$setflags(r3, 0x2, 0x1) 08:53:17 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x17) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x48) [ 2038.968421][T14415] __nla_validate_parse: 18 callbacks suppressed [ 2038.968432][T14415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2039.001713][T14417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 08:53:17 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x28, r5, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0xc, 0x13, @l2={'ib', 0x3a, 'lo\x00'}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0xa26418ccdcd1ca9f, 0x70bd28, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2039.052439][T14421] validate_nla: 8 callbacks suppressed [ 2039.052448][T14421] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2039.061388][T14415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2039.088393][T14421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2039.112773][T14417] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2039.131407][T14421] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2039.147669][T14417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:17 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400480, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x17) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b06050000000000000000060000000000000004000780050001000700"/44], 0x2c}}, 0x0) mq_unlink(&(0x7f0000000080)='syz2\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000180)={0x980000, 0x9, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x30397, 0x7, [], @p_u32=&(0x7f0000000100)}}) ioctl$KVM_GET_API_VERSION(r4, 0xae00, 0x0) 08:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 2039.252054][T14421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:18 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2005aff7e", 0x1c}], 0x14}, 0x0) 08:53:18 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x17) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x48) 08:53:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2039.402778][T14536] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 08:53:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 2039.507611][T14540] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 08:53:18 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x614001, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c02211374a18fdd8498b7a20700bcaaf619003200fd00000400078005000100000000000000000000000000006f1bdb9b640008000000000000667258cfa8f6b1d1372c3df0e6a46e3523a87b444acf8b738500"/95], 0x2c}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x9, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000080)={0x0, 0x8, 0x4, 0x70000, 0x3, {0x77359400}, {0x2, 0x0, 0xfd, 0x7, 0x0, 0x9, "063bafc7"}, 0xcd4, 0x1, @userptr=0x1, 0x3f, 0x0, r4}) fspick(r5, &(0x7f0000000100)='./file0\x00', 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x101000, 0x0) [ 2039.642707][T14551] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xb03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2039.704880][T14558] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2039.756264][T14558] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2039.782806][T14551] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20402ff7e", 0x1c}], 0x14}, 0x0) 08:53:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 2039.782827][T14558] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:18 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x17) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x48) 08:53:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b0601000000000000000000000000000900020073797a3200000000040007800500010007000000"], 0x2c}}, 0x0) 08:53:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2040.045334][T14606] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2040.147946][T14606] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2040.174449][T14612] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:21 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0xfffffdde) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x10000000000000, 0x2) 08:53:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x13000000}, 0x0) 08:53:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000080)={0xfa, 0x1a}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x20000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000340)={0x4, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x8, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}}, {{0x2, 0x4e24, @loopback}}]}, 0x490) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r4, 0x0, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x9c6}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x308c02ab761092a9}, 0x4000000) r5 = socket(0x15, 0x5, 0x0) getsockopt(r5, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000000c0)={r8, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f00000000c0)={r8, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r8}, &(0x7f0000000140)=0x8) 08:53:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:21 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20403ff7e", 0x1c}], 0x14}, 0x0) 08:53:21 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000b0605000000000000000000000000000900020073797a3200000000040007800500010007000000b9f64169fc7a1e8072869f11dd57e174e414f43571dab72fb336fa249595a29a9361e28ba2067f36fc923a2bed4ea25e1c74"], 0x2c}}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@delpolicy={0x74, 0x14, 0x100, 0x70bd2d, 0x25dfdbfd, {{@in6=@mcast1, @in=@remote, 0x4e22, 0x3, 0x4e21, 0x7fff, 0x2, 0x20, 0x90, 0x32, 0x0, 0xffffffffffffffff}, 0x6e6bba, 0x1}, [@lifetime_val={0x24, 0x9, {0xfffffffffffffffa, 0x4a00000000000000, 0x5, 0xff}}]}, 0x74}, 0x1, 0x0, 0x0, 0x2000000}, 0xea26c5103869dd9e) 08:53:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) [ 2042.655253][T14634] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:21 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20404ff7e", 0x1c}], 0x14}, 0x0) 08:53:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xc03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x38, 0xb, 0x6, 0x10, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x2f}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x3fc352ff81a7efdf) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000000c0)={r5, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={r5, 0x7}, &(0x7f0000000080)=0x8) 08:53:22 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x4842) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x101000, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x4c, r3, 0x50a, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20277ce7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x40}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 08:53:22 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20405ff7e", 0x1c}], 0x14}, 0x0) 08:53:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001380)=ANY=[@ANYBLOB="f4c323eec83e53e9313d2e9f15a64a4a1a906a4c27cb4608e6ac4c22c7ef3a974ff2a8be35fde68b0c660e050fd87dc2b5ed4950ca79d92d52bc1202fcccfc3f515ce5527e209a136611d9bf118284878d118eede9e52893bffba883b75e214cb4541218a31a3775f7015ff9cf2078777421d8eec49f79b762acda27293c9b429969449b3213a674036377709e13a3ee8a1866b0b96c08e65496fa2202577a64f16e83bb2b0941ff0e5f0034f457a94d3afb07fd7d95581bbbc8be234077425f86e6ed8d2df5542e34cd0a23372a2b8dcf0ad4f596c465d2dd363a8ca24480f6d0d07027c08c4e08368e5ece8f94687f575c928719ca05cdc8e53122a445570fb58f742b0ded2e2d079f3a482c878f894853c339495e5beb69faf7bed7034597de706e38c314174b70aae6a30945c86d2a6dbf503b2a7092cfb4a36aa28df7680815b648b32dc8e9a8a1963055f3f8b0bfcd55531a00743173cbb8526761e314e964a3226c1ce68444234fe1311c636f669657717001e542c15e6556c057d3b6f108ceb0a18ebb587103f2aba2ce73485146cc3920a1f4404f1cca5598db12c1d3bb6e1072ab396106336cb639e3db49c2137eff367a9558b26767a1bebb44b796eb264d5fe5e2f24ff1c71b45c81ec8b222157c685c55bc25f39f1d1985738d8bb4d83bd3acd499296048743cdd21e29a561fef978c1f805a09802fa8aa439154a23107f9f324ce75d1e752e52584d19551ccf60478546575dad21d5683fcb430f1d4ebfe20453a64ba972a84ca62b9185e0b7b2f423cfce9adc70662f72c6679ff5eccc0a83fd8591a0574f5c4810e6fa7fc71a85acd5d6ebedb84b9ec99ed74e3bb1e916eeaa66ea16bcef8b1acfea454b1cbeeb224cc30914517d06cb4b2610e548c6f578df2a9cf64742e3d1989a43a5899297bbb0d148305ef779e0ec4a437994b5abbb45a5229dcdbd81d639fd262a858f69a3ef95dafb624145a2f8f9ed42c221a6ef08c5a116037c23732b9d86edaeaecd99d459e2a19f157e00ab832f7be488f0ed0591f9d633e30bc74fda5f26592a8db93282f24824bccb74113501d114bf9d98b2edf5a3d758652f77d8d5b9fae9c520ee09633f527ca28840ab783def9ec59a789337ffd0a478211cbbf05e76ab063f222719e473a6e05c0328a8985cb087d4b728a487c569bca7683c30b867896c67607bd8b3da9b94cd4369ee4d20a5ed688d4fda807070c4875e141381d057ded5953a0666042d23d498b6e128d74e006fe957617344f5c99d9df20215e90b7dfe95da64c3a060225a6229e5a830bc6f16463aeabb45be2704fce92fa8ab44bceec28260a7b433dbb314c0476841474dc1f831dac90e84177c99626f5469c24ffb1b1eabf67218e95ed23c1a71e7b78a7310f4891d5bbc0cb285cffff30dee9844f2076e9f3fc1a437d47b81402d73de13d995c9cdabb2ea7000326cf1d48c68e323e9547fcfb31cb0a8d69b3a9fe947f445dd15e4f3af0e8f0372dcdff46554116cc7dd29d178fba109d809741ba1684fd1c82b91383178fe85b89a9781d5727fea57b0b772401df5bca25f413806bba94ebd9a4dd23cf3e1e69876adbd783b33cfeafd0c55e8b08fda6d315231b25c228be0e3890e50c34f762e97a8ebcb61d02e7423d1e974688ff52de7fed1f39f6b74378acc02fcb833416c99bcc2b65944fd3228a306d477b5dc3b14e191c2236755bca91d874f5eabad5a1b54273c699a84f1462c46154f62a2ba57b82b5f4b1f15a814e33965fa81e915e194048f634b546934d804c5ace90cd93984a8a999edfa14952c5cb1a7de250a9606cf8727cdb9a4913c1ee165e369ed852f137b7b61a8c4ff67fbe336485e2fc439e95d831c4e387ea50a61afba1232eeb158f55269a356ae111cdd303b8b58fe52ae996aaad2c400404df3b58a238789af572f7e355de00b881fe77f85ce926c5a2b0d2799a2b1fcecba84b5449d6ec6664c7312a3c6f7eacda0ce09cd4bcabba7fd47f18e5995c5572ffebcd6781eb6f46963a018f8d2fbf94b961bd0cc25e64f783e5affe74ceb5567a7ca0b9d2fb9ca52a02ee694d7c29913db6bd5d9efcce5396097c8a15c12ad4abb13f7529e82f2a2279c52e1e6749b220fa2ed54a4d030b3a94de0e98a7bb5535bc06cabdece125073a5b9764f247a863bca99c22c81d4c965986c605acc59603874bcae6c62e75e1d591fff847d9fc0266e0f45d941eef16366868044cb7170d532088468a1abf173d09400d755ca610714357a0225fc9fe13a447111f5ddd2b11514b70ca92bd67cbd3430ac91ac032863b5cc90895e3bb002921eb25fcb4b3ca8185c69dcfc4372f17d76c896e08bc913c8b76a3ecadba0947f7ba421bc46ac7f0395454ec7596587c34685370d9898fd328f02b648d9ebe39a70b98a7e49598bd8732b771e4623e799ad719acd826b89a0a413dd67428dd3eec181d41881c45b36330b320ea7959323a984d520fe0dfa9a15fa377ebe03f7bac715c85e0f8a9f981b3c93a2245314b21874467eb20b9f01c9458b80d8b9c8a2eb9ee22b4f0df1a6d4e70e1396fcccee2919685398bed41216b9c08a13b7a7de1145b0b3a50f9900b99d817d4e3c728c3ea527f4e76b672b2e660cb63b64cf350d35af6a900de0111ea386ce9639cf2459063e528f7a8f3a1f4d1368a2fe4a66e8d1d8a09d690bdda341cfacc9a711ab671e1a4bae7174f64810a3c659c68f4fb5f57d91523b7325fba61b87b02e0a47d629b53e9976d7fa6c83a7fd60b4006a9756c584f14e1310ca18b20d684811417a7c41aa55b8ef5a6aef75921b7dcd9a4b9a5e555247a0170f6a7a19da5531aae6ac5f84e68b81a700feb33f469913ecb97eebf51fbae472a8dcee90d26e2cf08db31f13e41b5b6bcdf18c1be07f42fc0f03c9be267c172c31731fde3107905d7aae37f5f6aad3db9691cc37743eb56e4a3bb6a30ebca626a0a9bc62b1b00a99c495e0d2b347fcedb589de45169c1d6c16aa5a8b50a7c812f9fc885d39d11e357421b035966aa7b24d908850243ea63f7f156f9e8b04373da672346175fc1e39fb566198d6fb6851a6e530c100303da1f0229f8b20e089f96ee9cc954a3a6a90170bcfeea87670ed281192bb68ea627b59dbf797ffae9b8f0705af7e6a1df8410728f2d8bd6503dfb14376edbd7aea3ff3da478cd70dc14bb437ebc9151cfb3462e28aea1e760067813e2545ba6ec4bd4f08589621659f26fc5fc61ca4ce6c6a61f07c749e0ced63755f25b88cc5f8adaa1821586d7ff3de87451fd24fd818f06d99d15c19a01cbb300eda525c04e651df5ec6b9ca51e116d6d89073dd07525ef32f6cb4b0f946cc20e8187a76b96ad1bf8ce3e06d52e0082a493bf2982b4e35d05d291c96ffb99168758d6106f27409d4665cff3398017c994ba42f4ce12ccf48e768f85d6f165df7670c58292dda2f8fac0a06a86ffc21ef38627efd82cc6c47182786f6980bb86f6b90080a096f77d5c6665fec88878f90bee038f5380ecb81882e87128ed8aadc2a6e527ca484d112dfc99031c932a72180f04094df16415e0e25e60e4c04096c680e358f945ca139e083dd25819bfc0d9cb5d563c4a69ad70446e20d095ffbba944d26d0a52903b137757db2a12da78c275c9e00ae077329fbb287115cca5ece0cd72b500d72649acbef2393b9c71c25ba18b4a79dbfccfe2ed3bd455bf8f2059a07d71cf0f41bdddf247c7f956bef990f88fad8a3a9f884cea0d80bc8cebe09b6652c71eb275d39aa1b4f88ae1beb147843be68974ffeb81c6c53aa1763981e5583285df25f670b0f9a77a50385c707a3d9be0833c79eb5608ecd5e955da1abcd7d790b1afed306a1a3882ecebb05b4e7b8c9d9283ee3a985fbfcca943ad520291f04679b678de0e126b98b59bc8f2d108be45e8aee80277478908b9a1ae99c62420070d2710673fd9956d6984562f338fd486ffa3473acf9cf2c43a67ec41da0582ecfd63ff066ce9c3680989867015a12b744c8f6302cb40032d2c680defaf3151a08eaddfb4d61789994d2988e96a9c5fc484b41e54715b5fd999421485a5affc3137c4b0ed556b4f522d472e551cbb6aca5795b560c4a43b2795d08e14ebec805b0d1415410b6270e580fa745f31988a4f49adb94f71af624ff95595be9fedaafc35ee91f4d8ec626b59b2e4a60bed9502fa051428667c44b60fbcfb6af101e40677315772ba950ec103e9d87fae7b005a45950df303fbe3a77e860137b3248bfcc5d321359f6853f84cc00d410c4485bf5846aa06559e97418a1a7a3f62968b50228aa6e2c218b110087bc0a11fee14f834d3ec82e9b749ffee250a4ce93310741df621a3a0359bbb4db360f82fdd94d56de91c1889555aeb5694364817fbc8f5bd9aa190ff65441fc156db26ffb33b9e91f2c3c09735786d598ebf4e694ef558094ec7bc5caf2eb8f35902ee500206387ca1712031c38c1fe82d02d899ef28751de8d1c9d81b80663970495189b4cd8a3c8447b4fc33d386b125e6552da44e8a266ff6650d64e89eeb6b17f1602a3824d831be73e114c0b82be8d23d47895e64113cc3f21bad433e0dcdb68c6281ae6f4016b9a45cc716cb4eeeca73e500431e0cbb69a794b7f36d893c3749bcef0b1470c4bea2fb65a2f56e8642f3993eca65e54fb65b00fc19e77ae78af47cfd760f8d9c76fdebafed9a65e3967c78f77fc6a82104569c223a35ea9e8058c776d1a2f80c30b903600144fffa05638920230e8ce5c82b2af4ee0f861e870851d640b1a4a59c18d7896dfdc16ff0a14a1fbb48c6a25902992ca2e1f1b0bef2de3dd5f4fc518997594e74681fe09bdcf3d3ef039c7ba7de09f42c96a86e9d187ac463740580ea9d09db49accf4760f883db545b381b391dcc85cd21af3a0f51f18c68d23f45c368c16d3e82e0fff0bca05d5c6fe8881e14df3166eeff593deff8b254b5fac79c889656d5d80f9be1a178e2ddbc835657c506cdad96c5c34efb0c6f508cccc60ada57f706edc31efbd73767eb400301b8978e5ed0fba7522d4ee02f41c56bfa781dd745b328a475517cf66103ee40e40f3092fa71f1843d6345f87952c55bb51407527fc9b8bbecd5337d537297751941d02157594e050c3c11a70edf7c5537ec1dc9c135782a015de99edd27633c4b885f318999767981110f8f5e18ef1cb22443bae22b9007fcfca726eeb2f2ea1df42accf509c21b80d8cab988a95cedb993313363df822adfb6b51343ba210ea611ea024dfa0a03aa6d5facbe79e64efbdcd05244f327b06f89799fe7e5722106012018f02632dce3ed41bfa796d81059a84fd86b514e1b0132d7de2027719dcb9074a417bd0f4959ed6b56466c1940ca0a54f9da535ebcac187ba05afa76fcc32c183e4096f159da0f5c016f8bc472c2759aab4f16fce47a9074d73e9453012eec93cb1a84c0f65a01b4fea5d04404fa896cf8a9c5bfe04eb148453c985e80c45da9bf46ec52f4f33692238968e25b33bb3c36c44cc8d448ffd6507274c4cb0b92ec1ae2a9b05fb4f5dae715ecb400b248730e1f23ff5910fe8a070e25c0112009c165f418152e8754c41df790aafe1bd7f88bce3a08bd20e362eadd973541b6e4bd25217366a1b1e7088b54f45fc6abbfe973704bbc7af34cb87f67073f88a8fe75fcf526e5d76e6267b774dbe1c3aa9e5b6e8d58451277bfe114afaa3354b838b1440401f9bdb91aac9c42952cf288699a50edc38c57a9517046aba1a4357ae8d7dac6fb0399cbfd0a07", @ANYRES16, @ANYRES16=r1, @ANYRESOCT=r3, @ANYBLOB="321eb5b0f0adaa280de90a080e2dc60bd75235cb2caeb322077bf9e547cf6e6fb4c4115d23c11bf31c45de06d0444d8ff2a81742d83c2705bf9bab805f5dc76750a94cca642e7e60eab64a3efa13cbc8daded622d9aa59459cc9e64723af6615c36008c34d611dec83293bb9682a50d77c4352e4b42375ee7042ef468e945cfbefdc593624c11e91d89243b64fab3ba0a0154dbb802b776c4c23e695f4d275c4172dd975869ce13fbe01a7105fd9a7ec133f7bc2b3490987"], 0x5}, 0x1, 0x0, 0x0, 0x11}, 0x2) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x100000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f0000000180)='vlan0\x00') ioctl$IOC_PR_REGISTER(r4, 0x401870c8, &(0x7f0000000100)={0x312, 0x7, 0x1}) r7 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x57864e96) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0x58) 08:53:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 08:53:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20406ff7e", 0x1c}], 0x14}, 0x0) 08:53:22 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) write$P9_RAUTH(r1, &(0x7f0000000000)={0x14, 0x67, 0x2, {0x15, 0x2, 0x7}}, 0x14) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 08:53:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20407ff7e", 0x1c}], 0x14}, 0x0) [ 2044.167808][T14817] __nla_validate_parse: 25 callbacks suppressed [ 2044.167819][T14817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2044.245872][T14878] validate_nla: 11 callbacks suppressed [ 2044.245882][T14878] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2044.273745][T14878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2044.304647][T14817] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2044.313642][T14878] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2044.322266][T14817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2044.331775][T14878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:25 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x10d, 0x4, 0xab, "241328739eb04fa2dc76a4e8ec6ed7b0", "b7077c39ca35d57a0a48c8c8581683443d066bfef20ecfbc7e3c0579b801efdf9b85f92d5dae919362b271706ba510a2b08e2365681f99f06496a5190922c87fe165463fa23a8824ea0dc182f166a05a66e8cffbd389659285c9f9c180f56788c57d746711292c3c3cede3fe39568e5f72ef2f92cc6fc035ba2e02499f329cbbb92f5789f0b7842a29890161bd6e0ceb98e781b5728aea14480ef9952ca7cdd44a331dccf57fc7ea265818ee57024db530b747874947909342cca76ea4ec0b6f7a0fcef6e070f08c6c4dace4b38f03862aad91a0b107039a0325cd188e280a5bb99eea56bbb481708be90c6b3fa02d0aee808792cf506224"}, 0x10d, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x118, r4, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4c9e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3af}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffff2a9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4d}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40}, 0x4000002) ioctl$TIOCSCTTY(r1, 0x540e, 0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x5238000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000380)=""/149, 0x95}, 0x40000172) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x300, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xd3050000}, 0x0) 08:53:25 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2040aff7e", 0x1c}], 0x14}, 0x0) 08:53:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 2047.141315][T14893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2047.178813][T14893] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:25 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x2, r0, 0x3ff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x28, 0xb, 0x6, 0x20, 0xffffffff, 0x25dfdbfd, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x2c6}]}, 0x28}}, 0x0) 08:53:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xd03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2047.204456][T14893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2047.251459][T14893] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:25 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="04000000f36b2226c278ced2080000000538b43e8a680d69e52c11f0f3ae5bc9c2fd00000000f1eac89977c653084f42fafe8952fd08bc1a59565779eb9e3be3799609cdd45c71a1e56256a9fcd40900000eaa29a2d64f28c7d107c089d07a59aec576bde516c1922574fa3fec10f36e6c3ee6feffffffd33ac62ccd2218e3393efd8c4172e0212cf1"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) setsockopt$sock_int(r1, 0x1, 0x5, &(0x7f0000000000)=0xdc8, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2047.312853][T14893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 08:53:26 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2040eff7e", 0x1c}], 0x14}, 0x0) 08:53:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2c00000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x1, 0x200, 0x70bd2d, 0x25dfdbfb, {0x2, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b0605000054000000010000000000000800020073797a3200000000040007800500010007000000"], 0x2c}}, 0x0) [ 2047.664872][T14980] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 2047.723258][T14984] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2047.778678][T14984] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2047.847336][T14980] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:26 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2047.906401][T14984] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2047.921330][T14980] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:26 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2041cff7e", 0x1c}], 0x14}, 0x0) 08:53:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 08:53:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x48, 0xb, 0x6, 0x5, 0xfffffffe, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = getpid() ptrace$poke(0x4, r3, &(0x7f0000000000), 0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000440)={0x414, 0xa, 0x4, 0x61a3486b2bfa7ba8, 0x0, {r4, r5/1000+10000}, {0x1, 0x8, 0x40, 0xdb, 0x0, 0x6, "97e1a42a"}, 0x401, 0x0, @offset=0x80000001, 0x9, 0x0, 0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r7, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x28, r8, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0xc, 0x13, @l2={'ib', 0x3a, 'lo\x00'}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x13040c}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, r8, 0x4, 0x70bd29, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x44000840) 08:53:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2048.146881][T15005] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2048.218411][T15005] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:29 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000000)=0x5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:29 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20448ff7e", 0x1c}], 0x14}, 0x0) 08:53:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 08:53:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x0, 0x2, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xafd842aaa51a234b}, @empty]}) 08:53:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xe03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:29 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2050.857161][T15066] __nla_validate_parse: 5 callbacks suppressed [ 2050.857172][T15066] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:29 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x202441, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000000b0605000000000000000000000000000900020073797a320000000004000780050001000700000014000300686173683a69702c706f72742c697000c12dfc64be071423f25d9c0280d3b6dd43bce395c7785f06829cf7f012d78b47b425a981eb6294b933cf9ca0ffffffffffff5ecbf0aec76e224666bd0fe7dc8eedd0506044817bfef1058c36cafd222e63fc68946272e73c9e1c1184b797ad250c931d20bcd3d277ff0885feba"], 0x40}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000040)=""/55) 08:53:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 08:53:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2050.957086][T15075] validate_nla: 1 callbacks suppressed [ 2050.957094][T15075] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2051.052116][T15075] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:29 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0209000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) 08:53:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x2) [ 2051.125907][T15066] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:29 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0xffff, "217d82294b8b922063e3afc972cd80eb062f555771f23234f2ad817cc58b578a", 0x1, 0x800, 0x1, 0xf900, 0x40000, 0x2}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x12) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) fchmod(r3, 0xa0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000040)=""/35, 0xffbf) [ 2051.186581][T15066] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2051.250360][T15094] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 08:53:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$eventfd(r1, &(0x7f0000000240), 0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0xd, 0x6, 0x400, 0x70bd2d, 0x25dfdbfd, {0x7, 0x0, 0x5}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x19}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x4880}, 0x24040050) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)={0x0, 0xe6c, 0x7, 0x81, 0x7, "16cf567cc5b0d1f3"}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000280)) 08:53:29 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2044cff7e", 0x1c}], 0x14}, 0x0) 08:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x3) 08:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = syz_open_procfs(r3, &(0x7f0000000080)='sched\x00') r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, r5, 0x14fe5824a721d774, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @broadcast}}, @NLBL_UNLABEL_A_IFACE={0x14}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x30}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_0\x00'}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x801) 08:53:30 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0209000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 2051.535763][T15213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:30 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000000)={0x3}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mknodat(r3, &(0x7f0000000040)='./file0\x00', 0x800, 0xfffffffb) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2051.604972][T15217] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2051.628473][T15217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x4) 08:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0xf03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2051.738540][T15213] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2051.752267][T15226] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2051.812647][T15213] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2051.838228][T15226] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 08:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xa) 08:53:30 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20460ff7e", 0x1c}], 0x14}, 0x0) 08:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2051.931918][T15226] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2051.995896][T15242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:30 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0xffff, "217d82294b8b922063e3afc972cd80eb062f555771f23234f2ad817cc58b578a", 0x1, 0x800, 0x1, 0xf900, 0x40000, 0x2}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x12) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) fchmod(r3, 0xa0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000040)=""/35, 0xffbf) [ 2052.041254][T15242] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r2, 0x8004550f, &(0x7f0000000080)=0x4) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x0, &(0x7f00000000c0)=0xfffff27f, 0x4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'veth1_to_team\x00', &(0x7f0000000280)=@ethtool_sfeatures={0x3b, 0x8, [{0xa085, 0x7351}, {0x1f, 0x8}, {0x200, 0x564a}, {0xff}, {0xf9b0, 0xff}, {0x7f, 0x42}, {0x7fffffff, 0x8d79}, {0x3f, 0x3}]}}) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20c00000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x124, 0x3, 0x1, 0x100, 0x70bd26, 0x25dfdbfe, {0x5, 0x0, 0x1}, [@CTA_PROTOINFO={0x2c, 0x4, @CTA_PROTOINFO_DCCP={0x28, 0x2, [@CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x8}, @CTA_PROTOINFO_DCCP_STATE={0x5}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x5}]}}, @CTA_ID={0x8, 0xc, 0x4}, @CTA_HELP={0x14, 0x5, {0xe, 0x1, 'sip-20000\x00'}}, @CTA_TIMEOUT={0x8, 0x7, 0x1}, @CTA_MARK={0x8, 0x8, 0xc3}, @CTA_ZONE={0x6, 0x12, 0x2}, @CTA_TUPLE_REPLY={0x18, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}]}, @CTA_TUPLE_REPLY={0x98, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x88b}, {0x8, 0x2, @rand_addr=0x10001}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x776}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x2b}}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x18881}, 0x6040900) 08:53:30 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="23a12033b93ee48c0d760a816cdc2b1337e2e7c3ca575b8ebfd821eeba11d0aac6824ea38b685779a0c0572d5358ba87bfcd"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rxrpc(r3, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x24) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xe) [ 2052.105031][T15242] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:30 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20468ff7e", 0x1c}], 0x14}, 0x0) 08:53:31 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyprintk\x00', 0x8000, 0x0) fcntl$setstatus(r0, 0x4, 0x6000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf) [ 2052.422732][T15270] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2052.476764][T15270] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2052.513254][T15273] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:31 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0xffff, "217d82294b8b922063e3afc972cd80eb062f555771f23234f2ad817cc58b578a", 0x1, 0x800, 0x1, 0xf900, 0x40000, 0x2}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x12) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) fchmod(r3, 0xa0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000040)=""/35, 0xffbf) 08:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x13) 08:53:31 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2046cff7e", 0x1c}], 0x14}, 0x0) 08:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:31 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0xffff, "217d82294b8b922063e3afc972cd80eb062f555771f23234f2ad817cc58b578a", 0x1, 0x800, 0x1, 0xf900, 0x40000, 0x2}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x12) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) fchmod(r3, 0xa0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000040)=""/35, 0xffbf) 08:53:31 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x3f, 0xfe00, 0x200]}, 0xa) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x14) 08:53:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0xfffffffffffffd5c}}, 0x0) 08:53:31 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20474ff7e", 0x1c}], 0x14}, 0x0) 08:53:31 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0xffff, "217d82294b8b922063e3afc972cd80eb062f555771f23234f2ad817cc58b578a", 0x1, 0x800, 0x1, 0xf900, 0x40000, 0x2}) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x12) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r1) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) fchmod(r3, 0xa0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000040)=""/35, 0xffbf) 08:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x60) 08:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x50, 0xb, 0x6, 0x385, 0x0, 0xfffffffd, {}, [@IPSET_ATTR_DATA={0x30, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x82}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x942}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x80}]}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) 08:53:32 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba2047aff7e", 0x1c}], 0x14}, 0x0) 08:53:32 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="0694477e5e03520e6d6c552f34997270b9e46f6f1dbae11f7a94d2b36238f4cbd82e0e598b2c8efad98bca86ca4dda8c4948d5260d169910f5cafddce1f15a19250452b1479ce7756830eb08f0e8afd15d4c1d6bfb1c1857b4259095fede757aad5275b960c4f10e07007f3f6d677abc1edc61c4107617468293639227b09d9adca752c06c967754ac2297502d0063404798c8e6830475916b2983a88c4d44303733be249f7fa45c2dd167790433cbe8d5382ab32ac965141d8850544ba080eb14140a9bfa", @ANYRES32, @ANYRES32=r3, @ANYRESHEX, @ANYRESHEX=0x0, @ANYRES16=r1, @ANYPTR], @ANYRES32=0x0, @ANYRESHEX, @ANYRESHEX=0x0]], 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x3c, 0xb, 0x6, 0x5, 0x0, 0x0, {0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000040)=0xffffffff) 08:53:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf0) 08:53:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:32 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0xf}], 0x14}, 0x0) 08:53:32 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sched_rr_get_interval(r4, &(0x7f0000000080)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r6, 0x80046402, &(0x7f0000000100)=0x4) 08:53:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000080)="b6a45016a395a8ae2f823c281fd0bb8a14c08032cf3af80516994580dc616ebe190edc9dc001f9996de32e0ac5d5700fdda8129e4f23647372bd6bf4053dbb26fad89644e5f374427c1c735112b89d4ee06fa0d59c31fc291d2183b84d496e1cdc2b9dcebd1c5d7996e3730bd9b595a0a65c6908f6636a8c35d9a2643c29c510415ea5ee094bb32748421e05dc4cae4741d0815cc7bf3716398af961b7d620d612cbe731a508fd8565fc95c2bae18a11e5681615441b8a744fe65175af15c87ea2c239e2") 08:53:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x300) 08:53:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:32 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x5a}], 0x14}, 0x0) 08:53:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r2 = accept4(r1, &(0x7f0000000080)=@caif=@dgm, &(0x7f0000000100)=0x80, 0x800) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000140)={{0x1f, 0x2, 0x40, 0xae, 0xa1, 0x5}, 0x3}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x10882, 0x0) accept$ax25(r3, &(0x7f0000000180)={{0x3, @rose}, [@default, @rose, @default, @bcast, @default, @default, @netrom, @netrom]}, &(0x7f0000000200)=0x355) 08:53:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000140)={0xa00000, 0x4, 0x9, r0, 0x0, &(0x7f0000000100)={0x990a7d, 0x80000000, [], @string=&(0x7f00000000c0)=0x6}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x4}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x9, 0x10000}, &(0x7f0000000200)=0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0x4) ioctl$SOUND_MIXER_WRITE_RECSRC(r3, 0xc0044dff, &(0x7f0000000180)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:53:35 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sched_rr_get_interval(r4, &(0x7f0000000080)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r6, 0x80046402, &(0x7f0000000100)=0x4) 08:53:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x5d3) 08:53:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x2000025c}], 0x14}, 0x0) 08:53:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[]}}, 0x0) 08:53:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xc0000, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x3000}]) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1010, r6, 0xfb910000) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) io_submit(r2, 0x3, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x800, r3, &(0x7f0000000080)="3edd6e9016453ada9df2185827f80c223a65689efecbdcb458cc9ff8601607643bf13f1e09de7c9f095f7689618b360ef8d41a03d0ddd7fccb9d2a880cef535e9b9a57aa92af7a2c284e", 0x4a, 0x2, 0x0, 0x1, r5}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x6, r0, &(0x7f0000000140)="df9ca3407213067cc5a1e17cee404562a4d32b257ac4a1e534c5ebe2b6b80f27baf8d674340c71b03fc19ed9884d16cc2cf86a67e2a9ad6b1ff6c438edc580864e183dfd1ce200e79a1d54bea807024508ea7e35e784f6573153df6545b1a8ba32215cc9c6204efc8d57434ed4c0044ad748038514e14da0f69cb5ff19c95e094ceee0441c9f81e07bf214f6aaebdb7d4c3ff22404ef5ae2e4fe326b48cfe785768a4fcf", 0xa4, 0x9, 0x0, 0x2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f0000000340)="758cf0e77a84fa99bd5820e012e07c4cb62377f9c0e894862f9a864df0d1751f9c49e8391941c205ebd1a464961179fc585367dd004f27c4f733b3f16b9482d68c8751d9d7c514f7cb3d5a38c0263cb87b7b61c54e7d6b9866f649afb5214abdec5665dd268ccc9f7760ed9ebb45dc452657b76a375f265c33aa20e730454f5b762b088d892981ebf919c10c9f5c0f661f67523d0c9784a04f7c8fc20758ff377ff89349ec7537896d40bb83c7cfc70f543b26d5d5f9475ce3d12e1b98f606d8f241f57b78830d15ca1c54f12a38cd404a562e4135", 0xd5, 0x3, 0x0, 0x2}]) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 2056.683585][T15399] __nla_validate_parse: 24 callbacks suppressed [ 2056.683596][T15399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2056.748367][T15400] warn_alloc: 8 callbacks suppressed [ 2056.749629][T15400] syz-executor.5: vmalloc: allocation failure: 17179869200 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0-1 08:53:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x7ffff000}], 0x14}, 0x0) [ 2056.796047][T15400] CPU: 1 PID: 15400 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2056.804782][T15400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2056.814849][T15400] Call Trace: [ 2056.818162][T15400] dump_stack+0x197/0x210 [ 2056.822527][T15400] warn_alloc.cold+0x87/0x164 [ 2056.827223][T15400] ? zone_watermark_ok_safe+0x260/0x260 [ 2056.832796][T15400] ? fs_reclaim_release+0xf/0x30 [ 2056.837759][T15400] ? __kasan_check_read+0x11/0x20 [ 2056.842808][T15400] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2056.848987][T15400] __vmalloc_node_range+0x44c/0x790 [ 2056.854224][T15400] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2056.860050][T15400] ? ip_set_alloc+0x4d/0x5e [ 2056.864580][T15400] vzalloc+0x6b/0x90 [ 2056.868485][T15400] ? ip_set_alloc+0x4d/0x5e [ 2056.873003][T15400] ip_set_alloc+0x4d/0x5e [ 2056.874584][T15408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2056.877343][T15400] hash_netnet_create+0x413/0xa60 08:53:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x94fdff1c}], 0x14}, 0x0) [ 2056.877365][T15400] ? hash_netnet4_list+0x1400/0x1400 [ 2056.877380][T15400] ip_set_create+0x6f1/0x1500 [ 2056.877400][T15400] ? ip_set_destroy+0xb70/0xb70 [ 2056.877455][T15400] ? ip_set_destroy+0xb70/0xb70 [ 2056.877478][T15400] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 2056.916520][T15400] ? nfnetlink_bind+0x2c0/0x2c0 [ 2056.921395][T15400] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2056.927145][T15400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2056.933401][T15400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2056.939672][T15400] ? cred_has_capability+0x199/0x330 [ 2056.945075][T15400] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2056.950732][T15400] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2056.956378][T15400] ? __local_bh_enable_ip+0x15a/0x270 [ 2056.962122][T15400] ? __check_heap_object+0xa3/0xb3 [ 2056.967264][T15400] netlink_rcv_skb+0x177/0x450 [ 2056.972078][T15400] ? nfnetlink_bind+0x2c0/0x2c0 [ 2056.976953][T15400] ? netlink_ack+0xb50/0xb50 [ 2056.981565][T15400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2056.987979][T15400] ? ns_capable_common+0x93/0x100 [ 2056.993024][T15400] ? ns_capable+0x20/0x30 [ 2056.997372][T15400] ? __netlink_ns_capable+0x104/0x140 [ 2057.002769][T15400] nfnetlink_rcv+0x1ba/0x460 [ 2057.009031][T15400] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 2057.014505][T15400] ? netlink_deliver_tap+0x24a/0xbe0 [ 2057.019817][T15400] netlink_unicast+0x58c/0x7d0 [ 2057.024602][T15400] ? netlink_attachskb+0x870/0x870 [ 2057.029757][T15400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2057.036370][T15400] netlink_sendmsg+0x91c/0xea0 08:53:35 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x2}, 0x0) [ 2057.037773][T15414] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2057.041154][T15400] ? netlink_unicast+0x7d0/0x7d0 [ 2057.041178][T15400] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2057.041194][T15400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2057.041217][T15400] ? security_socket_sendmsg+0x8d/0xc0 [ 2057.072308][T15400] ? netlink_unicast+0x7d0/0x7d0 [ 2057.077263][T15400] sock_sendmsg+0xd7/0x130 [ 2057.081786][T15400] ____sys_sendmsg+0x753/0x880 [ 2057.086568][T15400] ? kernel_sendmsg+0x50/0x50 [ 2057.091260][T15400] ? __fget+0x35d/0x550 [ 2057.095426][T15400] ? find_held_lock+0x35/0x130 [ 2057.100222][T15400] ___sys_sendmsg+0x100/0x170 [ 2057.104926][T15400] ? sendmsg_copy_msghdr+0x70/0x70 [ 2057.110064][T15400] ? __kasan_check_read+0x11/0x20 [ 2057.115109][T15400] ? __fget+0x37f/0x550 [ 2057.119298][T15400] ? ksys_dup3+0x3e0/0x3e0 [ 2057.123740][T15400] ? __fget_light+0x1a9/0x230 [ 2057.128437][T15400] ? __fdget+0x1b/0x20 [ 2057.132519][T15400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2057.138777][T15400] __sys_sendmsg+0x105/0x1d0 [ 2057.143371][T15400] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2057.148509][T15400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2057.153982][T15400] ? do_syscall_64+0x26/0x790 [ 2057.158672][T15400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2057.164755][T15400] ? do_syscall_64+0x26/0x790 [ 2057.169446][T15400] __x64_sys_sendmsg+0x78/0xb0 [ 2057.174224][T15400] do_syscall_64+0xfa/0x790 [ 2057.178742][T15400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2057.184640][T15400] RIP: 0033:0x45af49 [ 2057.188541][T15400] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2057.208160][T15400] RSP: 002b:00007fac13bd1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2057.216591][T15400] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 2057.224575][T15400] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 2057.232559][T15400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 08:53:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xa00) [ 2057.240541][T15400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fac13bd26d4 [ 2057.242861][T15419] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2057.248520][T15400] R13: 00000000004c9d56 R14: 00000000004e2e48 R15: 00000000ffffffff [ 2057.308355][T15400] Mem-Info: [ 2057.311735][T15400] active_anon:180359 inactive_anon:234 isolated_anon:0 [ 2057.311735][T15400] active_file:8068 inactive_file:32562 isolated_file:0 [ 2057.311735][T15400] unevictable:0 dirty:163 writeback:0 unstable:0 [ 2057.311735][T15400] slab_reclaimable:15896 slab_unreclaimable:102738 [ 2057.311735][T15400] mapped:60642 shmem:306 pagetables:2403 bounce:0 [ 2057.311735][T15400] free:579959 free_pcp:290 free_cma:0 [ 2057.353992][T15404] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2057.363531][T15400] Node 0 active_anon:721280kB inactive_anon:876kB active_file:32140kB inactive_file:130208kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:242568kB dirty:648kB writeback:0kB shmem:1164kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 206848kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2057.432182][T15400] Node 1 active_anon:56kB inactive_anon:60kB active_file:132kB inactive_file:40kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:60kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 2057.459824][T15400] Node 0 DMA free:10408kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2057.489061][T15400] lowmem_reserve[]: 0 2535 2535 2535 2535 [ 2057.494914][T15400] Node 0 DMA32 free:164024kB min:117280kB low:126300kB high:135320kB reserved_highatomic:0KB active_anon:721480kB inactive_anon:876kB active_file:32140kB inactive_file:130208kB unevictable:0kB writepending:648kB present:3129332kB managed:2599264kB mlocked:0kB kernel_stack:9072kB pagetables:9608kB bounce:0kB free_pcp:1892kB local_pcp:568kB free_cma:0kB [ 2057.529285][T15400] lowmem_reserve[]: 0 0 0 0 0 [ 2057.534004][T15400] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2057.562144][T15400] lowmem_reserve[]: 0 0 0 0 0 [ 2057.566873][T15400] Node 1 Normal free:2145544kB min:53800kB low:67248kB high:80696kB reserved_highatomic:0KB active_anon:56kB inactive_anon:60kB active_file:132kB inactive_file:40kB unevictable:0kB writepending:4kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:112kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2057.597823][T15400] lowmem_reserve[]: 0 0 0 0 0 [ 2057.602521][T15400] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 1*32kB (U) 0*64kB 1*128kB (U) 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10408kB [ 2057.616022][T15400] Node 0 DMA32: 4346*4kB (UME) 202*8kB (UM) 834*16kB (UME) 1118*32kB (UME) 486*64kB (UM) 195*128kB (UM) 81*256kB (UME) 35*512kB (UME) 1*1024kB (M) 0*2048kB 0*4096kB = 163864kB [ 2057.633802][T15400] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2057.645739][T15400] Node 1 Normal: 200*4kB (UME) 223*8kB (UME) 201*16kB (UME) 191*32kB (UME) 184*64kB (UME) 171*128kB (UM) 165*256kB (UM) 165*512kB (UME) 159*1024kB (UME) 26*2048kB (UME) 429*4096kB (UM) = 2145544kB [ 2057.666002][T15400] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2057.676371][T15400] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2057.685664][T15400] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2057.695407][T15400] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2057.704795][T15400] 11490 total pagecache pages [ 2057.709656][T15400] 0 pages in swap cache [ 2057.713797][T15400] Swap cache stats: add 0, delete 0, find 0/0 [ 2057.719915][T15400] Free swap = 0kB [ 2057.723646][T15400] Total swap = 0kB [ 2057.727872][T15400] 1965979 pages RAM 08:53:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000140)={0xa00000, 0x4, 0x9, r0, 0x0, &(0x7f0000000100)={0x990a7d, 0x80000000, [], @string=&(0x7f00000000c0)=0x6}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x4}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x9, 0x10000}, &(0x7f0000000200)=0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r4, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0x4) ioctl$SOUND_MIXER_WRITE_RECSRC(r3, 0xc0044dff, &(0x7f0000000180)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) 08:53:36 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! '], 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sched_rr_get_interval(r4, &(0x7f0000000080)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r6, 0x80046402, &(0x7f0000000100)=0x4) 08:53:36 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x3}, 0x0) [ 2057.731684][T15400] 0 pages HighMem/MovableOnly [ 2057.736451][T15400] 344636 pages reserved [ 2057.740597][T15400] 0 pages cma reserved 08:53:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xe00) 08:53:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2057.803837][T15431] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:36 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x4}, 0x0) 08:53:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000080)) 08:53:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf00) 08:53:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:36 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2058.074323][T15448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x1300) 08:53:36 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x5}, 0x0) [ 2058.460134][T15471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffff7f}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0xfff9}], 0x1) semop(r1, &(0x7f0000000040)=[{}, {0x0, 0xffffffff}], 0x2) semtimedop(r1, &(0x7f0000000100)=[{0x0, 0x5b}], 0x1, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresgid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000340)={{0x0, r2, r3, r5, r6, 0x20, 0x8}, 0x4, 0x200, 0x0, 0x0, 0x0, 0x0, 0x7f}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b0605000000000000000000000000000900350073797a3200000000040007800500010007000000"], 0x2c}}, 0x0) 08:53:37 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x1400) 08:53:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:37 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x6}, 0x0) 08:53:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x4000) 08:53:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1400}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:37 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2058.758292][T15492] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:37 executing program 4 (fault-call:8 fault-nth:0): r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:37 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x7}, 0x0) 08:53:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x6000) 08:53:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1401}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2059.101548][T15516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}}}, 0x8008000) 08:53:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xd305) 08:53:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:38 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x8}, 0x0) 08:53:38 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:38 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:38 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x9}, 0x0) 08:53:38 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf000) 08:53:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:38 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) [ 2059.646624][ T27] audit: type=1800 audit(1578905618.250:165): pid=15535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17656 res=0 08:53:38 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0xa}, 0x0) 08:53:38 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2059.904578][ T27] audit: type=1800 audit(1578905618.510:166): pid=15576 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17656 res=0 08:53:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x34000) 08:53:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 08:53:38 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0xb}, 0x0) 08:53:38 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x400300) 08:53:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34a, 0xb, 0x6, 0x5}, 0x7}}, 0x0) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f0000000100)=""/132, &(0x7f0000000000)=0x84) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10, 0x800) fcntl$setlease(r3, 0x400, 0x0) 08:53:39 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0xc}, 0x0) 08:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf0ffff) 08:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:39 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0xd}, 0x0) 08:53:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000000b0605000000000000e2ffffffffffff0800020073797a320000000004000f8005000100070000006f275857f71f3351e3d91a353efd3d855000abbd53ab25de2f7babeb9542b088763c044b29317be76ffab432878145f9ad0d6658bdc19bbceadff137aae897272e82537b6b6fd9268ff4f41337810ce757a3d63fc0e33779c4e18092d55f2dfed689d352d64a9fbe4a55353c978da1fa78d70ae7d2415cb27ae7f501aca3c59928"], 0x2c}}, 0x0) 08:53:39 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:39 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0xe}, 0x0) 08:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x1000000) 08:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000000b060500000000000000000000000000090002000700fdff0000000000000000000000000000000061841c8612ee4ee3ecaa4e2d22e94b7da7fbdb622b72762ead4c6c1a6123feae58bfe4c63ba76fa9a6a147193ca84accc6ec194688036756410ed49811cff4b7734556f8b77ddfa749f074cae585c17a41ab"], 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000100)={0x6, r4}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000040)=0x72394ff4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readlinkat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/62, 0x3e) 08:53:39 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0xba, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9b505b82362a2318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2040, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, r2, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x20, r5, 0x0, 0x70bd26, 0x0, {}, [@NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x20}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x48, r5, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x240000000000}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffffffff7fff}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xc, 0x10, r7, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x2000000) 08:53:39 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0xf}, 0x0) 08:53:39 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:39 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x1, 0x3, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffff}, r2, 0xffffffffffffffff, r4, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040)={0x0, 0x5}, 0x2) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2c, 0xb, 0x6, 0x5, 0x70bd2b, 0x0, {}, [@IPSET_ATTR_SETNAME={0xe0, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x0, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x8000000) 08:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x3000000) 08:53:40 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x10}, 0x0) 08:53:40 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x4000000) 08:53:40 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:40 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYRES64=r3], 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r4, 0x40045730, &(0x7f0000000040)=0xffff7fff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETA(r6, 0x5406, &(0x7f0000000080)={0x3, 0x1, 0x1, 0x1, 0xd, "49bd47166840010d"}) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:40 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x11}, 0x0) 08:53:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:40 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x25dfdbff, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xa000000) [ 2061.937926][T15752] __nla_validate_parse: 11 callbacks suppressed [ 2061.937936][T15752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2062.025872][ T27] audit: type=1800 audit(1578905620.630:167): pid=15749 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16541 res=0 [ 2062.049396][T15752] validate_nla: 12 callbacks suppressed [ 2062.049405][T15752] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2062.096015][T15752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2062.141096][T15752] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2062.171704][T15765] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:40 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2062.186648][T15752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fstatfs(r0, &(0x7f0000000080)=""/110) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) gettid() sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x9, 0x200, 0x70bd2b, 0x25dfdbfd, {0x3, 0x0, 0xa}, [@NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x4}, @NFCTH_STATUS={0x8, 0x6, 0x1}, @NFCTH_POLICY={0xc, 0x4, {0x8, 0x5, 0x667}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc78}, 0x8c) 08:53:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xe000000) [ 2062.241153][T15765] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:40 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:40 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x12}, 0x0) 08:53:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:41 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf000000) 08:53:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x10f, &(0x7f0000000000)={&(0x7f0000000080)={0x30, 0xb, 0x6, 0x504, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x30}}, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2062.553811][T15789] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2062.629827][T15796] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2062.669355][T15796] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x13000000) [ 2062.739486][T15789] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:41 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2062.795945][T15789] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000000b0605000000000000000000180000000900020073797a32000000000420078005000100070000004cd9cc3675138b27abed359d6649773b1d7571aa365d89c02960252d76695274fe7d78830980c9c010172403c16908c3ec0dddaa6a419c3227037ddd243b3b0847e37f6e5cf240cd938c1ef45b18755b2ad40538e5c9db86b2fdeff351ad12f4094594256c130cbba3d3a24f97"], 0x2c}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) accept$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0xc0a, r2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x301100, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x24100040}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x0, 0x2, 0x800, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x4}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0xfffffff8}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0xda}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'pptp\x00'}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_TUPLE={0x20, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x44044}, 0x4040000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x8000) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) [ 2062.836164][ T27] audit: type=1800 audit(1578905621.430:168): pid=15802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17691 res=0 08:53:41 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x13}, 0x0) [ 2062.997293][T15819] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 08:53:41 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2063.041560][ T27] audit: type=1800 audit(1578905621.650:169): pid=15817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17691 res=0 [ 2063.115016][T15819] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2063.152508][T15826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2063.206353][T15832] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:41 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) unshare(0x8020000) perf_event_open(&(0x7f0000000300)={0x1, 0x17d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r1, 0x16}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000000)={0x5, 0x0, [], {0x0, @reserved}}) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000003c0)) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000400)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xf, r0, 0x1000, &(0x7f0000000500)="6e1620b1cff7de40659fce063bf2bd207bf3ba5ec97b0d2e025809065b071f565fd0844ce5e77677e7ce20a8f93db210a9af3fc770678481378f2f62a890676d758fe0250b421c1bdf1d2d940c1b74416341ffacbe7283ea5cb61f865b346e4a9d99c78bb6ae1bf68695e73546e5ab7e867c02faf850787ab1c94c65f317107ea9d5") ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f0000000140)=0x4) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380), 0x4) syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x400083) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x40, 0x0, 0x2000000, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc76b164d32084a5c) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x14000000) 08:53:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x4, 0x6, 0x2, 0x70bd2b, 0x25dfdbf9, {0x1, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0xf5c564add028ebc) 08:53:41 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2063.332870][ T27] audit: type=1800 audit(1578905621.940:170): pid=15834 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17688 res=0 [ 2063.334490][T15826] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2063.406454][T15832] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:53:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x40000000) 08:53:42 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x5a}, 0x0) 08:53:42 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2063.605152][ T27] audit: type=1800 audit(1578905622.210:171): pid=15853 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16528 res=0 08:53:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_bcm(0x1d, 0x2, 0x2) signalfd4(r1, &(0x7f0000000080)={0x7fffffff}, 0x8, 0xc1c00) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1800}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x60000000) 08:53:42 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x54, r4, 0x10, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:42 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:42 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x2}, 0x0) 08:53:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x9effffff) 08:53:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200080, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000000c0)={0x3, 0x0, &(0x7f0000fff000/0x1000)=nil}) 08:53:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xd3050000) 08:53:42 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:43 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x3}, 0x0) [ 2064.351571][ T27] audit: type=1800 audit(1578905622.960:172): pid=15896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17701 res=0 08:53:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b0605000000000000000017000000000900020073797a3200000000040007800504010007000000"], 0x2c}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_crypto(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x32c68cd8ee77973a}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@upd={0xf8, 0x12, 0x2, 0x70bd2b, 0x25dfdbfd, {{'drbg_pr_sha1\x00'}, [], [], 0x400, 0xc00}, [{0x8, 0x1, 0xfffffff8}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0xfffffff8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) 08:53:43 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r2, 0x0, &(0x7f0000000080)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0xb, 0x70, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x6, 0x20000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa6, 0x4, @perf_config_ext={0x10001, 0xffffffffffffffe2}, 0x8400, 0x0, 0x1, 0x8, 0xa2a, 0xffffffc1, 0x2770}, 0x0, 0xe, r4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:43 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2064.582191][ T27] audit: type=1800 audit(1578905623.190:173): pid=15918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=17685 res=0 08:53:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf0ffffff) 08:53:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000080)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='io\x00') syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, &(0x7f0000000180), 0x1a840a8, &(0x7f00000001c0)={[{@discard='discard'}, {@discard='discard'}, {@acl='acl'}, {@locktable={'locktable', 0x3d, 'syz2\x00'}}], [{@hash='hash'}]}) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) 08:53:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:43 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4}, 0x0) 08:53:43 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xfffff000) 08:53:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:43 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01b9a18f40ff8c9dbba403047a0936454ef837376bc070bdda2d7d2cbd01e499049c553947991da13b365ecf745827cc9cdfdf6d0a9c08c204fa38dd9eb6e1700cb417e5c1a12170ff34e7704c86d100"/95], 0x5) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000080)={r2, 0xfffffffffffffffe, 0x7}) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:43 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x5}, 0x0) 08:53:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xffffff7f) 08:53:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:43 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xffffff9e) 08:53:44 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6}, 0x0) 08:53:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x30, 0xb, 0x6, 0x5, 0x0, 0x2, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="580000000206050000000000000000000000000011000300686173683a6e65742c6e6574000000000900020073797a32000000000c000780080012400000000005000100070000000500046500000000050005000a000000"], 0x58}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x40000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm_plock\x00', 0x74142, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000700)=0xffffd1f5, 0x4) sendmsg$nl_route_sched(r6, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x21100002}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=@gettaction={0x84, 0x32, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x48, 0x1, [{0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x11, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x16, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10008004}, 0x0) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0xb21442, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0xffff}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl(r6, 0x30c4, &(0x7f0000000740)="4056f7a6e656b8bc1f4da14d133782c7c687c16fa407a87c4337a865b7d733af807a88f7430b23bd6afaeabe83d700b27cb63addca87c9f68b09d629b98beda2918bbd8bf879320cef3b59db75bbfdaf248c16e0006f5c6ef3a7cdf80ac874d423d083d3cf3f728dee5d76406826ddb1e08a97971563ceb1fffef24b28449e6015") sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000140)={0x0, 0xfffffda4, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r4, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r4, 0x824, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xed, 0xffffffffffffffff}}, @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0xa0}, 0x4) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETAF(r8, 0x5408, &(0x7f0000000680)={0x3f, 0x3ff, 0x9, 0x8, 0x5, "79eceb59913d59bf"}) setsockopt$XDP_UMEM_FILL_RING(r9, 0x11b, 0x5, &(0x7f0000000180)=0x400000, 0x4) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f00000000c0)={0x1, 0x0, [{}]}) 08:53:44 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x7, 0x101000) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f00000000c0)=""/95, 0x5f) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x6c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_DATA={0x48, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x7}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x5}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x8}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x9}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x80}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}]}, 0x6c}}, 0x0) 08:53:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xfffffff0) 08:53:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:44 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000040)=0x3) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) recvfrom$l2tp(r1, &(0x7f00000002c0)=""/4096, 0x1000, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 08:53:44 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7}, 0x0) 08:53:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000000b0605000000010000000000000000000900020073797a3200000000040007800500010007000000"], 0x2c}}, 0x0) 08:53:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:44 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xa}, 0x0) 08:53:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x40030000000000) 08:53:44 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x40) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r4 = dup2(r2, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x25dfdbff, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x4c}}, 0x0) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r8 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x4, 0x7, 0x9, 0x7, 0x0, 0x20, 0x80, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000540), 0x4}, 0x800, 0x1, 0x2, 0x6, 0x6, 0x2, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) r9 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r11, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r13, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r14 = socket$alg(0x26, 0x5, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f0000000380)) r16 = getegid() r17 = socket$inet(0x2, 0x3, 0xc0) sendmmsg$unix(r1, &(0x7f0000000700)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000140)="ab1c2d24e218f8400b3761937a1878777b2c0a3c881c7f69e679157883aa437bcc881d4671ad57901ba7eadf3bf9f14896ac9f7724f8a29c", 0x38}, {&(0x7f0000000180)="5e5790bb8e9d872fd2d9c60991d9f2382f5a1afc57bb7eba6fcf30219e76a11c29c026b5ebd9cd980a69279db1dcc678cf54a8e64f3c9b9b9ba691feb0", 0x3d}, {&(0x7f00000001c0)="0f0b660b8847fa7ce6890638b235e1505762caeb2e93f9014059bd96e414dc8b389c4988007a7053e8b65cddc1da51397a38640103870216e8e0288c8a19aca2aa16a9928789bb8aded0c1e4e3f45e1f3a99d79fbd", 0x55}, {&(0x7f0000000240)="3f6c8cd4b85737789c6706faca65a61606410699c4b36458e6572f3fca8eeffd70155f6f23e09cbf02602ef2d328743abc0778fdc4f67c0791c24eb883e7", 0x3e}, {&(0x7f0000000340)="1b25231bfd76324c52fdf0782af8e3451a53a3485f7283eba13d36301d5d13dbd16a26899d0be343bab0b4eef8ba38b5572567fe0b1e990a5661592f62c058b2a5a8067c1ec850af70c241d9089b085207e494ef50769f0e75e86a534bef07e2863dc9b54952bb4d19726d956c1c899768c74e97ce5fc2db9b2365c0449bdf723d37c7079204d7edd0f7b3bdc6667d612be3413b4938ee912a5b8901a117e6e6eaada6b8f415d120271218533358925d8240e2198f", 0xb5}, {&(0x7f0000000280)="e9697bbf9e2ff2e321299673e5c1b869e6d05a8c6fdbd30aa6813b52696e9192d9da", 0x22}], 0x6, 0x0, 0x0, 0xc000}, {&(0x7f0000000480)=@abs={0x2, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f00000002c0)="33f29c9b6fc0452eb4a36f0035fa4f2f9dba89b346dbdc482157667c4a343e7cd8c74ae5d796cc8df53c8ea3fbfd1dfe", 0x30}], 0x1, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r0, r4, r5, r6, r7, r0, r8]}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r9, r0, r0, r10, r11, r0]}}, @rights={{0x18, 0x1, 0x1, [r12, r13]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r14]}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xee00, r16}}}, @rights={{0x18, 0x1, 0x1, [r17, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0xe8, 0x14080}], 0x2, 0x8080) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:44 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf0ffffffffffff) 08:53:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xfffffffffffffec3, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x634}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x2, r2}) 08:53:45 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe}, 0x0) 08:53:45 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x100000000000000) 08:53:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x0, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x0, 0x14, 0x86}, @IPSET_ATTR_IP_TO={0x0, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x0, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}}, @IPSET_ATTR_LINENO={0x0, 0x9, 0x1, 0x0, 0x3f}, @IPSET_ATTR_TIMEOUT={0x0, 0x6, 0x1, 0x0, 0x129}, @IPSET_ATTR_IP_TO={0x0, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x0, 0x2, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, @IPSET_ATTR_PROTO={0x0, 0x7, 0x1}, @IPSET_ATTR_LINENO={0x0, 0x9, 0x1, 0x0, 0x7}]}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 08:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x200000000000000) 08:53:45 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x1c}, 0x0) 08:53:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2066.969776][T16138] __nla_validate_parse: 12 callbacks suppressed [ 2066.969787][T16138] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 08:53:45 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:45 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x300000000000000) [ 2067.102475][T16144] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xb42d1a28c8ddfcb5) 08:53:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1a03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:45 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x48}, 0x0) 08:53:45 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x400000000000000) 08:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2067.472634][T16172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:46 executing program 2: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r5) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={r1, r3, r5}, 0xc) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x5, [0xdd1, 0x4, 0x6, 0x7, 0x7f]}, &(0x7f00000000c0)=0xe) 08:53:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xa00000000000000) 08:53:46 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4c}, 0x0) 08:53:46 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB=';! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r4, &(0x7f0000000080)='ns/uts\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000000)=0x7ff, 0x4) 08:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2067.684466][T16195] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 08:53:46 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2067.763157][T16200] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xe00000000000000) 08:53:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000080)=0x7, 0x4) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) 08:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:46 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x60}, 0x0) 08:53:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf00000000000000) [ 2068.123224][T16225] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:46 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xbc, 0x0, 0x9, 0x100, 0x70bd2a, 0x25dfdbfe, {0x1, 0x0, 0x2}, [@NFCTH_POLICY={0xc, 0x4, {0x8, 0x5, 0x7}}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x2f}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x9}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0xe}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x4c, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x200581c1}, 0x40) 08:53:46 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x68}, 0x0) 08:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1b03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:47 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000000)=0x5e3, 0x4) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x1300000000000000) [ 2068.465288][T16247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}}, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="48000000070600022dbd7000ffdbdf250100000905000100070000000500010007000000080006400000207d0900020073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x44010) 08:53:47 executing program 5: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:47 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6c}, 0x0) 08:53:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x1400000000000000) 08:53:47 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x109600, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000000c0)={0x2, "7c14"}, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x6f, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="5bffffff0b06050000000000000000000700400000000100070000000c00075d08000b4000000fb205006fc0209835c74ffa345cf82cf81405030007000000"], 0xffffffffffffffdd}}, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) 08:53:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:47 executing program 5: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x4000000000000000) [ 2068.851547][T16276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:47 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x74}, 0x0) [ 2069.187196][T16298] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x6000000000000000) 08:53:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xfffffffffffffe75, &(0x7f0000000000)={&(0x7f0000000140)={0x2c, 0xb, 0x6, 0x5, 0xffffffff, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_TYPENAME={0x0, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x355}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x0, 0x7, 0x0, 0x1, [@IPSET_ATTR_SIZE={0x0, 0x17, 0x1, 0x0, 0x10000}, @IPSET_ATTR_CADT_FLAGS]}, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_REVISION={0x0, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 08:53:47 executing program 5: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:47 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2ad6cca33dc7297d27c59a86695036b7d2527575354b1641a4df3f04127217c3a0934df6d3693d1498e0e8b74d015cdf983d95e84a45ed3bb504b291dea862d1c1ec1b71152a0ae4a53b3df231f1be2de859fd8e"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:47 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7a}, 0x0) [ 2069.377196][T16309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1c03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x9effffff00000000) 08:53:48 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x20000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000180), &(0x7f0000000200)=0x4) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0xc6) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x80000) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000340)={@remote, @empty, @loopback, 0x5, 0x4000, 0x1, 0x0, 0x9, 0x400200, r8}) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xfffffffffffffe56, 0xfa00, {r4}}, 0xfffffffffffffdbc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000000b0605000000000000000000000000000000010007000000cbed09d31e00010007000000f306bc98566173683a6e65742c69666163650000"], 0x40}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept4$vsock_stream(r10, &(0x7f00000002c0)={0x28, 0x0, 0x5be42c9abf3ba15e, @host}, 0x10, 0xc0000) 08:53:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x300}, 0x0) 08:53:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xd305000000000000) 08:53:48 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe}, 0x0) 08:53:48 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="03b2a22e2f"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x500}, 0x0) 08:53:48 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xf0ffffff00000000) 08:53:48 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) unshare(0x8020000) perf_event_open(&(0x7f0000000300)={0x1, 0x17d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r1, 0x16}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000000)={0x5, 0x0, [], {0x0, @reserved}}) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000003c0)) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000400)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xf, r0, 0x1000, &(0x7f0000000500)="6e1620b1cff7de40659fce063bf2bd207bf3ba5ec97b0d2e025809065b071f565fd0844ce5e77677e7ce20a8f93db210a9af3fc770678481378f2f62a890676d758fe0250b421c1bdf1d2d940c1b74416341ffacbe7283ea5cb61f865b346e4a9d99c78bb6ae1bf68695e73546e5ab7e867c02faf850787ab1c94c65f317107ea9d5") ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f0000000140)=0x4) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380), 0x4) syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x400083) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x40, 0x0, 0x2000000, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc76b164d32084a5c) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x600}, 0x0) 08:53:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xffffff7f00000000) 08:53:48 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:48 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x700}, 0x0) 08:53:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1d03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:49 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="020000002f88dc32c1d67479ac4a9c267b3cc773787907e5f0000400007c01119326f6ab7e0002a236d88f5df5c60573ee364c2116cc8ef94c562c02f546634252a8ea4288792ddf881d9c84d92f274f3dee000000000000"], 0x5) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.impure\x00', &(0x7f0000000080)=""/34, 0x22) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x1ff) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000000c0)=0x2) ptrace$setopts(0x4206, r3, 0x0, 0x0) 08:53:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xffffffff00000000) 08:53:49 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xa00}, 0x0) 08:53:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:49 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) unshare(0x8020000) perf_event_open(&(0x7f0000000300)={0x1, 0x17d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r1, 0x16}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x50, 0x2, 0x6, 0x741882de26a818e7, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000000)={0x5, 0x0, [], {0x0, @reserved}}) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f00000003c0)) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000400)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$setregs(0xf, r0, 0x1000, &(0x7f0000000500)="6e1620b1cff7de40659fce063bf2bd207bf3ba5ec97b0d2e025809065b071f565fd0844ce5e77677e7ce20a8f93db210a9af3fc770678481378f2f62a890676d758fe0250b421c1bdf1d2d940c1b74416341ffacbe7283ea5cb61f865b346e4a9d99c78bb6ae1bf68695e73546e5ab7e867c02faf850787ab1c94c65f317107ea9d5") ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f0000000140)=0x4) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000380), 0x4) syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x400083) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x40, 0x0, 0x2000000, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc76b164d32084a5c) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:49 executing program 5: r0 = gettid() r1 = creat(0x0, 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0xfffffffffffff000) 08:53:49 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe00}, 0x0) 08:53:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000900020073797a32000000000c0007800800124000000000050001000700000001c938e18b4a0b4b506278001c620fbbbf17f603e50fd65bcfbe3c68a233c16c2384789ba3104b5656644f572060be9ea23d2eaf8de9b8163c21b78cd72b39058838"], 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000040)=0x996f) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x131481, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000140)=""/96) 08:53:49 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x1c00}, 0x0) 08:53:49 executing program 5: r0 = gettid() r1 = creat(0x0, 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:50 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0xfffffc56) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1f, 0x9, 0xff, 0x80, 0x0, 0x3, 0x20000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5, 0x1}, 0x824, 0xfde, 0x2, 0x1, 0xffffffffffffff3a, 0x1, 0x4}, 0x0, 0xa, r3, 0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:50 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x2000}, 0x0) 08:53:50 executing program 5: r0 = gettid() r1 = creat(0x0, 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x10f, &(0x7f0000000000)={&(0x7f0000000080)={0x30, 0xb, 0x6, 0x504, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x30}}, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1e03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9233eb81e3e75a29}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x3, 0x2, 0x20, 0x70bd2b, 0x25dfdbff, {0x3, 0x0, 0x3}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x10) 08:53:50 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x3f00}, 0x0) 08:53:50 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:50 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2072.048336][T16669] __nla_validate_parse: 10 callbacks suppressed [ 2072.048348][T16669] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000900020073797a32000020000c00078008001240000000000500010007000000"], 0x34}}, 0x0) 08:53:50 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4000}, 0x0) 08:53:50 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x10f, &(0x7f0000000000)={&(0x7f0000000080)={0x30, 0xb, 0x6, 0x504, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x30}}, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:50 executing program 4: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="d81a732df79f67224218e2f897a0be5513ccc2c47a143acc58951df9fb013c4b8309e431aa4ea436477865731b0195fb2568a091141d2c11f4a06a50458d918720a957d826d3157d172fda65c8d5038075a29a62825af5f71c0606daab0fa587d2cf54f3dd5b0361357e9bf040a965b854699d161585678dea5b9de3e4ed1e7448ca8539f290b295d8835348b5f76901dcfacd5602fec6aee94e219dacff31b487443bb9c80015104dffde6450e4798eef98cd16f65c75bf8ab933d5484f9103d9f8c5df098d657e8e87b70d95803b71dc"], 0x5) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x4, 0x7}]}, 0xc, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ptrace$getsig(0x4202, r1, 0x2, &(0x7f00000002c0)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0x0, 0x10000000, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x980903, 0xf3, [], @p_u32=&(0x7f0000000180)=0x7ff}}) setsockopt$inet6_opts(r3, 0x29, 0x34, &(0x7f0000000140)=@fragment={0x3a, 0x0, 0x5, 0x0, 0x0, 0x17, 0x66}, 0x8) [ 2072.391146][T16795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:51 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4800}, 0x0) 08:53:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x10f, &(0x7f0000000000)={&(0x7f0000000080)={0x30, 0xb, 0x6, 0x504, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x30}}, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:51 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000200)=0x7) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, 0x2, 0x1, 0x100, 0x70bd26, 0x25dfdbfe, {0x2, 0x0, 0x4}, [@CTA_STATUS={0x8, 0x3, 0x2}, @CTA_NAT_DST={0x3c, 0xd, [@CTA_NAT_V4_MINIP={0x8, 0x1, @empty}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @dev={0xfe, 0x80, [], 0x13}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @remote}]}, @CTA_STATUS={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x48}, 0x200040c1) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:51 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x3f, 0xb, 0x4, 0x1000000, 0x6, {}, {0x2, 0x0, 0x2, 0x6, 0x1, 0x4, "42304991"}, 0x5, 0x3, @offset=0x4, 0x3, 0x0, 0xffffffffffffffff}) write$P9_RVERSION(r2, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x9, 0x8, '9P2000.L'}, 0x15) [ 2072.730413][T16919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:51 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:51 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4c00}, 0x0) 08:53:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x1f03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2073.044852][T16942] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000000b06d200000000000000000000000073797a32000000000c000780081f1240000000000500010007000000000000000017555d815e5dcdda496d01cc03557350162020d42ae6a1"], 0x34}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0x80) sendto$llc(r1, &(0x7f00000000c0)="72ff842b0cfcc4464a48ae973bda335eda71dba8677379b4fb3e89f009c7fc122ba99fb9d2062dc93954b0119f03c2566bb2a6e78922f8b463dc95c2d683107bf00eb09cfb45cd7e52a8ae594b28", 0x4e, 0x40, &(0x7f0000000140)={0x1a, 0x335, 0x1e, 0x80, 0x8b, 0x3, @local}, 0x10) 08:53:51 executing program 2: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:51 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6000}, 0x0) 08:53:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2000}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:51 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:51 executing program 2: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2073.387872][T16959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f00000000c0)={0x0, 'vxcan1\x00', {}, 0xa1}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:52 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6800}, 0x0) 08:53:52 executing program 2: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:52 executing program 4: openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$USERIO_CMD_REGISTER(r4, &(0x7f0000000a00)={0x0, 0x4d}, 0x2) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x84f1f000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f0000000980)={{0xffffffffffffffff, 0x1, 0x3ff, 0x0, 0x4}, 0x80000000, 0x10001, 0x2}) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="a3d260661700000800436ee0afda0f00ded1e70f34"], 0x5) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r8 = socket$inet(0x10, 0x3, 0xc) sendmsg(r8, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r8, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r9 = socket$inet(0x10, 0x3, 0xc) sendmsg(r9, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r9, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000740)=0xe8) r13 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r13, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="5800dc980206450000000008080000060000000011110300686173683a6e65742c6e6574000000000900020073797a32000000000c00070000000000000008000000050005000a00"/88], 0x58}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000008c0)={0x5, 0x0, 0x4, 0x10, 0x2, {}, {0x5, 0x8, 0x2, 0x1, 0x3f, 0x3, "f2c04705"}, 0x8, 0x2, @userptr, 0x5, 0x0, r13}) ioctl$TCSETX(r14, 0x5433, &(0x7f0000000940)={0x4, 0x1, [0x3, 0x4, 0x40, 0x4900, 0x913], 0x3}) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f00000002c0)="d38c862ce0c9c23f6a281a21bc5769889142a6061346f8267cae054df7b68a55483016035fd6517e645ee0a78d90295c333ab638b1e43ea753ac882306a8cd4609ba4faeafb0c0a185fa9fd1f9b74e711ba930f638b66d3568c4303119b274d5f5939deb61512dbd97eeda08ef61e5f34d3ee4d28d2ea9a400242b78508e0af4363d124c1f3e0b613adf22275295d10de190fe0ff61f01b4a74a4ec34ed0e3627b4fca60d5d611e71120af06ec30", 0xae}, {&(0x7f0000000380)="602e8cd7f5b91a749c35c95d98ff56533a792c85d2486290dbebea4906d324f525997b2de95c6ff872a35bc637bb8b37b6404517fc4e9c339c00b80e5611ca92f16186a3e3f7435a60f4f174bb0fbe00738fb282557a4abc6a5b921824d114be67e96b96434fee36396e9963f70b7b0a93bc9bc1de305f42eed2905c23dc26a8e7a920d2583b3cabeec5a8f8247b609d6a39a74469c20d8a939228e3ec9e3ccc24f98b27bfec2f848e90d1c5645e286039936803bfc72ef7c89bc2f793409c1d15d871f850b7db1d00afe5d1b18fc84b1c1e4272171b87ee1019c3270b8561de221704271ae9af8cd02358c5ef267f4b68fb2458b061", 0xf6, 0x1ff}], 0x3202000, &(0x7f0000000780)={[{@fault_injection={'fault_injection', 0x3d, 0xfffffffffffff000}}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x3}}], [{@subj_role={'subj_role', 0x3d, 'wlan1+vboxnet1trusted'}}, {@uid_gt={'uid>', r7}}, {@euid_gt={'euid>', r10}}, {@euid_gt={'euid>', r11}}, {@uid_gt={'uid>', r12}}]}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2073.733257][T16982] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x800, 0x22) 08:53:52 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:52 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6c00}, 0x0) 08:53:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:52 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x329, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3, 0x500) connect$rose(r2, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @bcast}, 0x1c) [ 2074.069195][T17106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x74}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r5, @ANYBLOB="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"], 0x84}}, 0x0) r7 = socket$inet(0x10, 0x3, 0xc) sendmsg(r7, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r7, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @remote}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f0000000280)=0xe8) r9 = socket$inet(0x10, 0x3, 0xc) sendmsg(r9, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r9, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f00000002c0)={0x0, @empty}, &(0x7f0000000340)=0xc) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r11, &(0x7f0000000b40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000680)={&(0x7f0000000a00)={0x104, r12, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x1}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xdf, 0xac, "1d79a82d9ed672182ca18f1233f4c87229972de8726c29cdecc9cfc225e589549a1c7f14a5c75230ad696c63090aebdf1ee54c8c8d7f6fdad89cae8b54744f1b1bd3fa0581ef2789f094fa4efe6e25ab02fa9d2c52f94384b3ce277f3f13ec038ebb09a252323c9faa432242dea094f273730bc00e225d09851c0575a1a8ff3689c12a437be694f7f320fc3535c31004cb10d587d7db84986b7eb9473f0cb0168ebf642e644a20bd46ebecaeb3a55932019d40205fa438e2fe8e45aa79704c578fb4ff547704d9cbf4710c3cf488fc15c5e22b91606666f3998504"}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x7fff}]}, 0x104}, 0x1, 0x0, 0x0, 0x24000085}, 0x4040050) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r16, @ANYBLOB="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"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r16, @ANYBLOB="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"], 0x84}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1f4, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0xac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x2c52}}}, {0x38, 0x1, @mcast_rejoin_interval={{0xfffffffffffffd83, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r8}, {0x124, 0x2, [{0x4c, 0x1, @lb_tx_method={{0xfffffe3d, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x5, 0x4}, {0x66, 0x0, 0x9, 0x2}, {0xa35e, 0x40, 0x1, 0x4}, {0x100, 0x5f, 0x5, 0x401}, {0xfff8, 0x7a, 0x3f, 0xffffffe0}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r16}}}]}}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x4}, 0x8801) 08:53:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:52 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7400}, 0x0) 08:53:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2074.337838][T17117] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 08:53:53 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:53 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2074.394852][T17124] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2074.418770][T17218] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2074.445816][T17233] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 08:53:53 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7a00}, 0x0) 08:53:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000000)={0xc, {0x6, 0x0, 0x9, 0x6}}) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="23ef0cfd67"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RFLUSH(r5, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 2074.489636][T17117] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 08:53:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, 0x0, 0x40000) 08:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x30, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r3 = dup2(0xffffffffffffffff, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f00000000c0)="665dff6d0ff7a4ac2908c1a68ff24574be0d4fb521b45c622a4281a9e3a18d093e3851955447ac7fa9fc1d0ef3aec0a47edad930ea5cd1740a5d8600bd8d5cc61ab39f11d3dc8c22fc062803cfa29752d01705") sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, 0x3, 0x3, 0x8, 0x70bd2a, 0x25dfdbfb, {0x3, 0x0, 0x4}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x3}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x8}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x100}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x337}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x7}}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0xc0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000080)) 08:53:53 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x1000000}, 0x0) 08:53:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, 0x0, 0x40000) 08:53:53 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2074.960951][ T27] audit: type=1800 audit(1578905633.570:174): pid=17250 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16597 res=0 08:53:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x3c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0xb3cf78bf00a7dfbd}]}, 0x3c}}, 0x0) 08:53:53 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x2000000}, 0x0) 08:53:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, 0x0, 0x40000) 08:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:54 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "dbc2bb701b5bf92b920b225f0a99ea7fe7443ad9"}, 0x15, 0x6) 08:53:54 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0x40) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000003}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0xd, 0x6, 0x100, 0x70bd29, 0x25dfdbff, {0x7, 0x0, 0x1}, [@IPSET_ATTR_FAMILY={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8a1cdb9cdefd3e4}, 0x40) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:54 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x3000000}, 0x0) 08:53:54 executing program 1: alarm(0xffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:54 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:54 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4000000}, 0x0) 08:53:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000040), 0x4) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000001480)="e1a11aee445fa0e5fc7eaf45b8aabd237afe46d8c46e5c4efa0c07accf9f21f4a63c3bcdcd5aabfab25a994b3f11555d9f4d596c90a41f2a9a0c2aba5a830796b779ec17f7a9c6a2ccb6b2a6c4d73d96f3c07642237af9d1c50f0f74f4557837dbb38a10f4bdea0823cd25e2b78c31c7561adf179fe5951139d4fb77267b26c0538c3641e3cd8d3fae4c3f93716f06dafd7ba46431bc27e341cfc62331c9e3197f57be9afee44af47efde2c36a3fbf840c9be995486597b9592db2d42b677ce9ac33184788b7505a8c14a38c3f20", 0xce) write$UHID_INPUT(r3, &(0x7f0000000340)={0x8, {"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", 0x6b}}, 0x1006) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)=ANY=[@ANYBLOB="3400fdff0a0605e0ffffff0000000000000000000900020073797a08000000000c000780080012400000000005000100070000003246aeda6af23d7dab5c31d27ff7af5a58d2b9f6e1e380ad4a10ac48b829c030e732e67d6d814616c1196d1fafbb05a09283749502254091ebb2a69b76f678fde3b9edb28b8224d9965bdb44a72693790b4a855fa71627cff26090b3ab55777cdb78a58b9460509dc0991434531ef8359caa9420721d884270cbe09364e53a209420ca2beba7d92f70e02f34152cad30b08d5365770306c3ac64e9ef808ee58a41"], 0x34}}, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x11) sendto$l2tp6(r5, &(0x7f00000000c0)="42c695f5ad517511595573f239ce23d7169c25cf71d84450a89db0cd74f73c31abd1805fc9a38fd8842e3a8f5b3680469bdb7bc7884b687cf62090c5eda4c630e4ed3bd75a4c05c877020b7147c3c87316ef846600bb5970cd5596aba23e72e81e86f0363ff98d36ff9290c9aeb58daef080050e2bfebed4ea059447a98a4fe442", 0x81, 0x4000, &(0x7f0000000180)={0xa, 0x0, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x4}, 0x20) 08:53:54 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$P9_RVERSION(r2, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0x7fff, 0x6, '9P2000'}, 0x13) write$tun(0xffffffffffffffff, &(0x7f00000002c0)={@void, @void, @ipv4=@udp={{0x37, 0x4, 0x0, 0x3, 0x1ed, 0x68, 0x0, 0xf8, 0x11, 0x0, @dev={0xac, 0x14, 0x14, 0x16}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@ra={0x94, 0x4}, @end, @cipso={0x86, 0x5a, 0x2, [{0x7, 0x12, "b1fc1dfdd7a1c2e48d9cce1105a85677"}, {0x1, 0x12, "489ac6d07ca31aff4c9930a2df0e886c"}, {0x5, 0xa, "803723ab353d11d5"}, {0x0, 0x5, "d0250b"}, {0x5, 0xa, "71f1a7c019b7dc82"}, {0x7, 0xa, "92ae95e3a7d5fb9c"}, {0x2, 0xd, "2d584665b50499e471d5ee"}]}, @cipso={0x86, 0x4f, 0x3, [{0x7, 0x8, "99a99754ad0b"}, {0x5, 0xa, "70c0baa56e8e622b"}, {0x6, 0xb, "5c31f9e9d883747032"}, {0x0, 0x5, "c9fc9d"}, {0x6, 0xc, "25ceb5bcdd5555fb5464"}, {0x3, 0x8, "3e83710f6467"}, {0x4a22a93d26857632, 0x11, "4ce54d12464a3d3a5f6d47a396fdc8"}, {0x6, 0x2}]}, @timestamp_prespec={0x44, 0xc, 0xb5, 0x3, 0x6, [{@local, 0xfff}]}, @generic={0x106, 0xb, "13882a9937d4750438"}]}}, {0x4e22, 0x4e20, 0x111, 0x0, [@guehdr={0x1, 0x1, 0x1, 0x4, 0x100, @void}, @guehdr={0x2, 0x0, 0x2, 0x7f, 0x100, @val=0x2c9c9e6c9c98d6e2}, @guehdr={0x2, 0x0, 0x0, 0x32, 0x100, @val=0x100}, @guehdr={0x1, 0x0, 0x2, 0x6, 0x380, @void}, @guehdr={0x1, 0x1, 0x2, 0xe1, 0x0, @void}, @guehdr={0x2, 0x0, 0x3, 0x5, 0x300}], "22a5a95b9ffc90afbabeb4caed1d348a1eb873868232573e4043fd2945458ba03b08343a886a2f728821419cdee67d37b8f8cd37c400dcf5ce9fbcf2d677bbb6e2d773a22bdf7a449f8aa2ea2a8e4de6f75fbf78c780e0fc51dd58cf3ba8e1f674e5356a3acd92ec337870644e572964675abc330e707939423263493c2dda6bebc40b8570b8940ec4b3b9db0952bb031fae9e8f28773a23305f59d46560abaaff4463f79e6998819a63038dc350b65e68cbd3f36df946e98529f3476891193775a0b5b39431d316dea98e9c86ee068c748042b17c5794425242e7f8e1acc77331b9c2e74c"}}}, 0x1ed) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x50d, 0x40000, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x100000) 08:53:54 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x5000000}, 0x0) 08:53:54 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000000b0605000000000000000000003f000009de2d2573213b5229d8618a8b000780080012400000000005fd000007000000c374e738a88240a42e35919a8662bf8a1c"], 0x34}}, 0x0) 08:53:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6000000}, 0x0) 08:53:55 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7000000}, 0x0) 08:53:55 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\"! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x100, 0x1, 0x3f, 0x8001, 0xc, "aa1d3d0f2fbdc0b5"}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b0605fff500000000000000000000000900020073797a32000000000c000780080012400000004eeab9c06a2eccc200"], 0x34}}, 0x0) 08:53:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xa000000}, 0x0) 08:53:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000b1d5894f75000b0605000000000000000000000000000940020073797a32000000000c0007800800124000000000050001"], 0x34}}, 0x0) r1 = socket$inet(0x2, 0x1, 0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x4, [0x7, 0x5c7e, 0x8f45, 0xcd5]}, &(0x7f00000000c0)=0xc) 08:53:55 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2077.119375][T17603] __nla_validate_parse: 15 callbacks suppressed [ 2077.119385][T17603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:55 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe000000}, 0x0) 08:53:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) [ 2077.513337][T17659] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:56 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) perf_event_open(&(0x7f00000001c0)={0x1, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:56 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x4800, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000140)={0x1001, 0x0, 0x6c4e, 0x0, 0x80}) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x4e22, @multicast2}, 0x210) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000100)={0x18}, 0x18) 08:53:56 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x1c000000}, 0x0) 08:53:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x0, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) 08:53:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2077.812545][T17694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x0, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:56 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x4) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:56 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0x314, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:56 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x20000000}, 0x0) 08:53:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2400}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x0, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2078.216027][T17846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0xa8801, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f00000001c0)={0x3201e0d5, 0xffffffffffffffe1}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='cgroup\x00') write$P9_RREADLINK(r3, &(0x7f0000000140)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x1, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x800) 08:53:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2401}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:57 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x3f000000}, 0x0) 08:53:57 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="f6c82a104b0ad1884afb93cba59a5cd8fad537d5c71bf68bd05498500945088215478c16b3a383adfb79869008625cd6a595397c79"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet6(r1, &(0x7f0000000000)="a7b5014d9bf065cf0ed65b4dbb4024d719e161f7e8874be0a44f2811bb9a322e5d9c88ff61a182fc904c8b26714330ee058b", 0x32, 0x20000821, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @remote, 0x7}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") close(r2) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x0, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:57 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afd"], 0x1a) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2078.545303][T17934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000000b060500000000e51d2ee249ed2396bcff8b0000000000000000000900020073797a32000000000c000780080012400000000005000100270000001f5c12b835c7b0798463d8720695bb3d75507d875dcefcefdb83dfe898c567d39a9c077647df2562ddfd763a10239d6277c54eac08a49cb5498e203a982ccc7d"], 0x34}}, 0x0) iopl(0xcd) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000002700)={'team0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e493de9a33c0d1325a554cacdbe157c98bf0fd2c02e526db7e282df9be17467fcfd358fcd513ca5a786a8dff1d663acaa372b57142fd6a66ad381f9fcb119ea7b7853fa2a2ecc03c759ec1bb4050123edc3955bbebf9e9e91a8c124ca744419575825b8bad48be11521b30d3bfe10eb4e5f5191be7c04c10b893d956a6707aaa419b5f2c8f18b3f552da815eff05a975f45d16bd5542deb1399b1f041c5978c5f689989deb1ae5e2255779da15d0d687f0c59f5df7e67fde56835928a9bc6f9533cf66bd94111ce4969dc9f846d3c3c9bca01e241812b83bd18133a644b74ccbb"], 0x74}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r8, @ANYBLOB="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"], 0x84}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000002740)={@mcast1, 0x0}, &(0x7f0000002780)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000002980)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002940)={&(0x7f00000027c0)={0x178, r2, 0x408, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x15c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}]}}]}, 0x178}}, 0x20000001) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') openat(r12, &(0x7f0000000280)='./file0\x00', 0x400000, 0x100) sendmsg$TIPC_NL_MON_PEER_GET(r12, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4200081}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf0, r13, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xb7be}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xba}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4203}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 08:53:57 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x40000000}, 0x0) 08:53:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2078.802258][ T27] audit: type=1800 audit(1578905637.410:175): pid=17936 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16865 res=0 [ 2078.900087][T17957] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:57 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afd"], 0x1a) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2078.959255][T17956] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 08:53:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:57 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x48000000}, 0x0) 08:53:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r2 = fcntl$getown(r1, 0x9) getpriority(0x4, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) 08:53:57 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0d, 0xefd7219bee3e07fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2079.229694][T17975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:57 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afd"], 0x1a) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:58 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4c000000}, 0x0) 08:53:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5af6, 0x100) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="340000000b0605000000ffffff7efffffffff2007a74594a2d0672885832000000000c1ec650421f036e54780000000000008924ef361f373a8ecedf8f263f9fa91aef05b850772f6158ec95f0203ada50eeeadbfd5f2f990c38601bb94aa1706934b50f5192761d202337b04a3b1239978271c5020eac7b31cb6479617fcb56f0b9039904f36c173e2adc0f4853cc4471ca84cd7238e83aac5c30a5882eea1ccb8a9dd7df06f15509e574798610fe4bf4b6fdb64f697f870771bbe46743b67f146bca5f87459b6f3ecaf3c63239666572c2aa2be88831ef368113d93dcdfda771"], 0x34}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x154, r4, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xac, 0x8, [{0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x435e4431}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xc7ca905}]}, {0x34, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x377f1108}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfe}]}, {0x1c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x223598b4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa379e72}]}, {0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65fc697f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x860c58a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x26}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc2}]}, {0xc, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1a}]}, {0x14, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c6052cf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2af6b180}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x7c, 0x8, [{0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x334d442f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3de294e1}]}, {0x54, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xca}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1de16c8a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4f97095}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4131b40a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa2}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xfffffffffffffffc}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x154}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ptrace$peek(0x2, 0xffffffffffffffff, &(0x7f00000004c0)) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="5800000002060400000000686173683a6e65742c6e6574000000000900020073797a32000000000c000780080012400000000005000100070000000500040000000000050005000a000000a700"/89], 0x58}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) bind$l2tp6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x30, @ipv4={[], [], @multicast1}, 0xffff, 0x2}, 0x20) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$XDP_MMAP_OFFSETS(r7, 0x11b, 0x1, &(0x7f0000000500), &(0x7f0000000580)=0x80) chroot(&(0x7f0000000140)='./file0\x00') r8 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8983, &(0x7f00000005c0)={0x3, 'ip6_vti0\x00', {0xf3a}, 0x7fff}) 08:53:58 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0xec, r4, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x76}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x1}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_virt_wifi\x00'}}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x800}, 0x150ea1f17084bdcb) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2079.591805][T18005] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:53:58 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275"], 0x27) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2079.656725][T18007] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 08:53:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:58 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x60000000}, 0x0) 08:53:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") kcmp(r1, r2, 0x4, r3, 0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:58 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x68000000}, 0x0) 08:53:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:58 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275"], 0x27) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000900020073797a32000000000c000780080012400000000005000100070000002fe6c89cf26941c0eaeda7fc91e9f40b72a61e6c51"], 0x34}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000140)="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") 08:53:59 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000000)={0xffffffff, 0x3f, 0xff, 0x2773f877, 0x4, "30262139eda1e37d9d0bc42bcaedb5b8f62a17"}) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:53:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6c000000}, 0x0) 08:53:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000020}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, 0x2, 0x6, 0x100, 0x70bd2a, 0x25dfdbfd, {0x7, 0x0, 0x6}, [@IPSET_ATTR_DATA={0x68, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x8}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x7}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x89}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x1}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:53:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:59 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275"], 0x27) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x74000000}, 0x0) 08:53:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x6, 0x19d}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:59 executing program 1: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000080)={0x6, {{0x2, 0x4e20, @multicast2}}}, 0x88) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="580000000206050000000000000000000000000011000300686173683a6e65742c6e6574000000000900020073797a32000000000c000780080012400000000005000100070000000500040000000000050005000a0000005fab23bfd15da5dfc1f4e6aba4838b1cd904f2c75155fefa5ad514f28b6d5dd9c474da5390e20a40c69738d16ddf9fc80696c84d90c4dbd7b387e41dfcf7f60166b700bc91491bd362f0390ae5d37ad65687a489290a8335c0699d896563c4952cd265bc"], 0x58}}, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000580)='/dev/bsg\x00', 0x131481, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_DQEVENT(r5, 0x80885659, &(0x7f00000005c0)={0x0, @frame_sync}) 08:53:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7a000000}, 0x0) 08:53:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:59 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) 08:53:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x6, 0x19d}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:59 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7fffefc0}, 0x0) 08:53:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:53:59 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd"], 0x2e) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:53:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000000b06050000000000000000000000000900020073797a3200000000000005000100070000009e66f697e30b769541af347fde927067faa488449e4dbbc65dcb03b9fc021737bf3985a7e5773710f082c6937f89d849ed067ce652de00"/105], 0x34}}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7ff, 0x30}, 0xc) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000040)={0xc405, 0x9f}) 08:53:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x7, 0x6, 0x19d}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:53:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:00 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7fffefe4}, 0x0) 08:54:00 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd"], 0x2e) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x400301, 0x74) fanotify_init(0x40, 0x1400) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000240)={0xe74, 0x0, 0x4, 0x2000, 0x8, {r2, r3/1000+10000}, {0x4, 0x7cde99af4d61fdb8, 0x80, 0x4, 0x3, 0x80, "28958dde"}, 0x2, 0x1, @planes=&(0x7f0000000200)={0x80000000, 0x7, @userptr=0x3, 0xf17a}, 0x5}) r4 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfdf, 0x97ac0ab26002d2b2) ioctl$VIDIOC_ENUMOUTPUT(r4, 0xc0485630, &(0x7f0000000080)={0x62, "e9e6f7cbf0c1e7e59becc1115489820c54e84b8e77b7717c20da10f2ad5e3c7f", 0x1, 0x200, 0x2, 0x10, 0x8}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x80, 0xb, 0x6, 0x5, 0x0, 0x2, {0x5, 0x0, 0x2000}, [@IPSET_ATTR_DATA={0x58, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xaebb}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x4}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x7fffffff}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xea5}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_PROBES={0x5, 0x15, 0xfc}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x1}]}, @IPSET_ATTR_DATA={0xfffffffffffffddd, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x80}, 0x1, 0x0, 0x0, 0x24068880}, 0x4) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000340)={0x8, 0x1}) 08:54:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x40000) 08:54:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:00 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd"], 0x2e) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:00 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xc0efff7f}, 0x0) 08:54:00 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) prctl$PR_SET_PTRACER(0x59616d61, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x2, 0x8, 0x0, 0x4, 0x0, 0x1050d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x800, 0x1}, 0x820, 0x0, 0x0, 0x0, 0x0, 0xd1, 0x8}, r0, 0xffffffffffffffff, r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r9, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x84, r10, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x84}}, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f0000000300)={0x0, 0xfe53, &(0x7f0000000000)={&(0x7f0000000480)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x347, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xea9}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x3f}]}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x60}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200008}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="e4000000", @ANYRESHEX, @ANYRESOCT], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x4080005) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(r7, 0x8008563f, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r12 = pkey_alloc(0x0, 0x6) pkey_free(r12) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000080)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='syz0\x00', &(0x7f0000000140)='{}\'@\x00', &(0x7f0000000180)='eth1vboxnet0wlan0\'\x00', &(0x7f00000001c0)='syz0\x00', &(0x7f0000000200)='syz0\x00'], &(0x7f0000000480)=[&(0x7f0000000280)='-]nodevlo\x00', &(0x7f00000002c0)='syz0\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='syz0\x00', &(0x7f00000003c0)='vmnet0+\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='bdevmime_type\x00']) 08:54:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:00 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe4efff7f}, 0x0) 08:54:00 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d"], 0x31) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2082.152946][T18248] __nla_validate_parse: 11 callbacks suppressed [ 2082.152957][T18248] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x38, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x38}}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x48240, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000180)={0x3, @bcast, r2}) 08:54:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:00 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xf5ffffff}, 0x0) 08:54:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:01 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d"], 0x31) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:01 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f73f2bce3091561b06810d6981f7c44c59498b8cf7f3ccac39348d51962b39522348272082e4b990c447c10581b81fddf504d41e097d6c1e116cc7d1afd5015c8efd002c2d129f8fd15fb547bb31d185341a342a73e0417a8634b7106b7037fbe664e4087d5ccb9ccb64ea566b8e789947971f5f2f54d1ce67ebb54d75137bd55e5985d512bc056dc764bb7382189e3"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r5) r6 = getgid() r7 = getgid() newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r10) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r12) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r14) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r3}, {}], {0x4, 0x2}, [{0x8, 0x2, r5}, {0x8, 0x4, r6}, {0x8, 0x2, r7}, {0x8, 0x2, r8}, {0x8, 0x0, r10}, {0x8, 0x2, r12}, {0x8, 0x4, 0xee01}, {0x8, 0x1, r14}], {0x10, 0x6}, {0x20, 0x2}}, 0x74, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000900020073797a3200003e0456f000000c00078008001240000000000500010007000000"], 0x34}}, 0x0) [ 2082.566398][T18369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000080)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='syz0\x00', &(0x7f0000000140)='{}\'@\x00', &(0x7f0000000180)='eth1vboxnet0wlan0\'\x00', &(0x7f00000001c0)='syz0\x00', &(0x7f0000000200)='syz0\x00'], &(0x7f0000000480)=[&(0x7f0000000280)='-]nodevlo\x00', &(0x7f00000002c0)='syz0\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='syz0\x00', &(0x7f00000003c0)='vmnet0+\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='bdevmime_type\x00']) 08:54:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2800}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2082.709731][T18381] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:01 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xfcffffff}, 0x0) 08:54:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2082.875552][T18394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:01 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d"], 0x31) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000080)={[], 0x0, 0x7f, 0xc, 0x0, 0x101, 0x1d005, 0xd000, [], 0x7}) personality(0x1b10000e) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b0605001600000000000000000000000900020073797a32000000000c00078008001240000000000500010007000000"], 0x34}}, 0x0) 08:54:01 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2ffd353178fee58eb172d4c97688659a6035ade2d957435b2b8870f20c8bdca6725c975b76f4c61f647ca3897d7ff50e4749af12efd6e7fedf89aa60f9e1890316ecf0374e1224d1c5fd69afe1c929627c20c47f90f3ff153964940c5e3b8131"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x45407}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:01 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xffffff7f}, 0x0) 08:54:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x0, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2083.248204][T18445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:02 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d1743"], 0x33) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:02 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xfffffff5}, 0x0) 08:54:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 2083.556233][ T27] audit: type=1800 audit(1578905642.150:176): pid=18446 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16578 res=0 [ 2083.635507][T18462] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:02 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xfffffffc}, 0x0) 08:54:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x7, 0x6, 0x19d, 0x70bd29, 0x40, {0xc, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 08:54:02 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d1743"], 0x33) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2083.978528][T18477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:02 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:02 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d1743"], 0x33) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:02 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7ffffffff000}, 0x0) 08:54:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2084.238223][T18492] FAULT_INJECTION: forcing a failure. [ 2084.238223][T18492] name failslab, interval 1, probability 0, space 0, times 0 [ 2084.294271][T18497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2084.322164][T18492] CPU: 1 PID: 18492 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 2084.330892][T18492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2084.340962][T18492] Call Trace: [ 2084.344274][T18492] dump_stack+0x197/0x210 [ 2084.348627][T18492] should_fail.cold+0xa/0x15 [ 2084.353236][T18492] ? release_sock+0x156/0x1c0 [ 2084.357936][T18492] ? fault_create_debugfs_attr+0x180/0x180 [ 2084.363766][T18492] ? ___might_sleep+0x163/0x2c0 [ 2084.368657][T18492] __should_failslab+0x121/0x190 [ 2084.373623][T18492] should_failslab+0x9/0x14 [ 2084.378177][T18492] kmem_cache_alloc_node+0x268/0x740 [ 2084.383495][T18492] __alloc_skb+0xd5/0x5e0 [ 2084.387849][T18492] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2084.393536][T18492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2084.399893][T18492] ? netlink_autobind.isra.0+0x223/0x300 [ 2084.405560][T18492] netlink_sendmsg+0xa1b/0xea0 [ 2084.410355][T18492] ? netlink_unicast+0x7d0/0x7d0 [ 2084.415319][T18492] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2084.420638][T18492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2084.426906][T18492] ? security_socket_sendmsg+0x8d/0xc0 [ 2084.432514][T18492] ? netlink_unicast+0x7d0/0x7d0 [ 2084.437481][T18492] sock_sendmsg+0xd7/0x130 [ 2084.441925][T18492] ____sys_sendmsg+0x753/0x880 [ 2084.446728][T18492] ? kernel_sendmsg+0x50/0x50 [ 2084.451512][T18492] ? __fget+0x35d/0x550 [ 2084.455686][T18492] ? find_held_lock+0x35/0x130 [ 2084.460475][T18492] ___sys_sendmsg+0x100/0x170 [ 2084.465175][T18492] ? sendmsg_copy_msghdr+0x70/0x70 [ 2084.470308][T18492] ? __kasan_check_read+0x11/0x20 [ 2084.475351][T18492] ? __fget+0x37f/0x550 [ 2084.475970][T18503] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2084.479520][T18492] ? ksys_dup3+0x3e0/0x3e0 [ 2084.479543][T18492] ? __fget_light+0x1a9/0x230 [ 2084.479560][T18492] ? __fdget+0x1b/0x20 [ 2084.479578][T18492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2084.479598][T18492] __sys_sendmsg+0x105/0x1d0 [ 2084.479611][T18492] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2084.479638][T18492] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2084.523409][T18492] ? do_syscall_64+0x26/0x790 [ 2084.528109][T18492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2084.534192][T18492] ? do_syscall_64+0x26/0x790 [ 2084.538896][T18492] __x64_sys_sendmsg+0x78/0xb0 [ 2084.543710][T18492] do_syscall_64+0xfa/0x790 [ 2084.548239][T18492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2084.554145][T18492] RIP: 0033:0x45af49 [ 2084.558060][T18492] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2084.577700][T18492] RSP: 002b:00007fcb2715bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2084.586127][T18492] RAX: ffffffffffffffda RBX: 00007fcb2715bc90 RCX: 000000000045af49 08:54:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xf0ffffff7f0000}, 0x0) 08:54:03 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = socket$inet6(0xa, 0x0, 0x4) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") fcntl$getflags(r2, 0x14) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x34, r4, 0x3, 0x0, 0x0, {}, [@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0xfffffffffffffec4, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x84, r4, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x4) 08:54:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x100000000000000}, 0x0) [ 2084.594122][T18492] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2084.602107][T18492] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2084.610096][T18492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb2715c6d4 [ 2084.618191][T18492] R13: 00000000004c9e0b R14: 00000000004e2ef0 R15: 0000000000000004 08:54:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2084.698586][T18564] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:03 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x200000000000000}, 0x0) 08:54:03 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f00000002c0)=ANY=[@ANYBLOB="f700000069bc45b05b3192a8d131eceae3e28f821005f62286c0fd7a6dd9375266b17679d0a761b01ce66685d27f1c0cde082122361c7a2c0e1346338ff3955ccd2f84d688a0f85f18531f898f464ac6bc39f0ec6f745bf6d367f0811a5014bfc7c9d1646c202b02b030c0cc0e536edb177f00c30c742109f9aec83eb895f9256a68f46ada22eb6f6c6884f310316cbe8db576f1422516f535ddceee4c38fd298519a866fdef3e9e6ad768e5545805bb4e076b7e8ece58261ae86c7f7f54ecf3247f03fb71dfa9f5bbc75753c43a79fb380f65645df382e89f0027f3a9bd60b3d071593976aa36423cbe47654c00"/251]) prctl$PR_SET_PTRACER(0x59616d61, r0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev, @multicast1}, &(0x7f0000000040)=0xc) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:03 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:03 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x300000000000000}, 0x0) [ 2085.190066][T18636] FAULT_INJECTION: forcing a failure. [ 2085.190066][T18636] name failslab, interval 1, probability 0, space 0, times 0 08:54:03 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2085.292859][T18636] CPU: 0 PID: 18636 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 2085.301620][T18636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2085.311690][T18636] Call Trace: [ 2085.315003][T18636] dump_stack+0x197/0x210 [ 2085.319354][T18636] should_fail.cold+0xa/0x15 [ 2085.323967][T18636] ? fault_create_debugfs_attr+0x180/0x180 [ 2085.329805][T18636] ? ___might_sleep+0x163/0x2c0 [ 2085.334677][T18636] __should_failslab+0x121/0x190 [ 2085.339644][T18636] should_failslab+0x9/0x14 [ 2085.344220][T18636] kmem_cache_alloc_node_trace+0x274/0x750 [ 2085.350044][T18636] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2085.356043][T18636] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2085.361881][T18636] __kmalloc_node_track_caller+0x3d/0x70 [ 2085.367544][T18636] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2085.372943][T18636] __alloc_skb+0x10b/0x5e0 [ 2085.377386][T18636] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2085.383135][T18636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2085.389398][T18636] ? netlink_autobind.isra.0+0x223/0x300 [ 2085.395148][T18636] netlink_sendmsg+0xa1b/0xea0 [ 2085.399942][T18636] ? netlink_unicast+0x7d0/0x7d0 [ 2085.404908][T18636] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2085.410216][T18636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2085.416484][T18636] ? security_socket_sendmsg+0x8d/0xc0 [ 2085.421967][T18636] ? netlink_unicast+0x7d0/0x7d0 [ 2085.430583][T18636] sock_sendmsg+0xd7/0x130 [ 2085.435032][T18636] ____sys_sendmsg+0x753/0x880 [ 2085.439828][T18636] ? kernel_sendmsg+0x50/0x50 [ 2085.444523][T18636] ? __fget+0x35d/0x550 [ 2085.448705][T18636] ? find_held_lock+0x35/0x130 [ 2085.453502][T18636] ___sys_sendmsg+0x100/0x170 [ 2085.458238][T18636] ? sendmsg_copy_msghdr+0x70/0x70 [ 2085.463370][T18636] ? __kasan_check_read+0x11/0x20 [ 2085.468981][T18636] ? __fget+0x37f/0x550 [ 2085.473203][T18636] ? ksys_dup3+0x3e0/0x3e0 [ 2085.477655][T18636] ? __fget_light+0x1a9/0x230 [ 2085.482350][T18636] ? __fdget+0x1b/0x20 [ 2085.486439][T18636] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2085.492695][T18636] __sys_sendmsg+0x105/0x1d0 [ 2085.497299][T18636] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2085.502358][T18636] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2085.507885][T18636] ? do_syscall_64+0x26/0x790 [ 2085.512726][T18636] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.518816][T18636] ? do_syscall_64+0x26/0x790 [ 2085.523609][T18636] __x64_sys_sendmsg+0x78/0xb0 [ 2085.528394][T18636] do_syscall_64+0xfa/0x790 [ 2085.532921][T18636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2085.538818][T18636] RIP: 0033:0x45af49 [ 2085.542813][T18636] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2085.562569][T18636] RSP: 002b:00007fcb2715bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2085.571026][T18636] RAX: ffffffffffffffda RBX: 00007fcb2715bc90 RCX: 000000000045af49 [ 2085.579010][T18636] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 08:54:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2085.587268][T18636] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2085.595302][T18636] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb2715c6d4 [ 2085.603291][T18636] R13: 00000000004c9e0b R14: 00000000004e2ef0 R15: 0000000000000004 08:54:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x400000000000000}, 0x0) 08:54:04 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! &/'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f0000000000)=0x1f) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000240)='dctcp-reno\x00', 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKFLSBUF(r5, 0x1261, &(0x7f0000000140)=0x5) r7 = getpid() ptrace$setopts(0x4206, r7, 0xffffffffffffff18, 0x20000b) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@ll, &(0x7f0000000100)=0x80) 08:54:04 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:04 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x500000000000000}, 0x0) 08:54:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2086.060287][T18689] FAULT_INJECTION: forcing a failure. [ 2086.060287][T18689] name failslab, interval 1, probability 0, space 0, times 0 08:54:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x600000000000000}, 0x0) 08:54:04 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2086.116300][T18689] CPU: 0 PID: 18689 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 2086.125052][T18689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2086.135147][T18689] Call Trace: [ 2086.138479][T18689] dump_stack+0x197/0x210 [ 2086.142837][T18689] should_fail.cold+0xa/0x15 [ 2086.147451][T18689] ? fault_create_debugfs_attr+0x180/0x180 [ 2086.153287][T18689] __should_failslab+0x121/0x190 [ 2086.158255][T18689] should_failslab+0x9/0x14 [ 2086.162779][T18689] kmem_cache_alloc+0x47/0x710 [ 2086.167564][T18689] ? lock_acquire+0x190/0x410 [ 2086.172257][T18689] ? netlink_deliver_tap+0x146/0xbe0 [ 2086.177563][T18689] skb_clone+0x154/0x3d0 [ 2086.181855][T18689] netlink_deliver_tap+0x943/0xbe0 [ 2086.187001][T18689] netlink_unicast+0x643/0x7d0 [ 2086.191792][T18689] ? netlink_attachskb+0x870/0x870 [ 2086.196924][T18689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2086.203192][T18689] netlink_sendmsg+0x91c/0xea0 [ 2086.207997][T18689] ? netlink_unicast+0x7d0/0x7d0 [ 2086.212965][T18689] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2086.218269][T18689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2086.224532][T18689] ? security_socket_sendmsg+0x8d/0xc0 [ 2086.230013][T18689] ? netlink_unicast+0x7d0/0x7d0 [ 2086.234979][T18689] sock_sendmsg+0xd7/0x130 [ 2086.239429][T18689] ____sys_sendmsg+0x753/0x880 [ 2086.244213][T18689] ? kernel_sendmsg+0x50/0x50 [ 2086.248906][T18689] ? __fget+0x35d/0x550 [ 2086.253082][T18689] ? find_held_lock+0x35/0x130 [ 2086.257903][T18689] ___sys_sendmsg+0x100/0x170 08:54:04 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x700000000000000}, 0x0) [ 2086.262606][T18689] ? sendmsg_copy_msghdr+0x70/0x70 [ 2086.267733][T18689] ? __kasan_check_read+0x11/0x20 [ 2086.272780][T18689] ? __fget+0x37f/0x550 [ 2086.276959][T18689] ? ksys_dup3+0x3e0/0x3e0 [ 2086.281399][T18689] ? __fget_light+0x1a9/0x230 [ 2086.286088][T18689] ? __fdget+0x1b/0x20 [ 2086.290184][T18689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2086.296444][T18689] __sys_sendmsg+0x105/0x1d0 [ 2086.301056][T18689] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2086.306103][T18689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2086.311579][T18689] ? do_syscall_64+0x26/0x790 08:54:04 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7d}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000040)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000080)=0x2c) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2086.316271][T18689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.322357][T18689] ? do_syscall_64+0x26/0x790 [ 2086.327060][T18689] __x64_sys_sendmsg+0x78/0xb0 [ 2086.331843][T18689] do_syscall_64+0xfa/0x790 [ 2086.336368][T18689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2086.342275][T18689] RIP: 0033:0x45af49 [ 2086.346277][T18689] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2086.365994][T18689] RSP: 002b:00007fcb2715bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2086.374429][T18689] RAX: ffffffffffffffda RBX: 00007fcb2715bc90 RCX: 000000000045af49 [ 2086.382597][T18689] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2086.390587][T18689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2086.398683][T18689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb2715c6d4 [ 2086.406673][T18689] R13: 00000000004c9e0b R14: 00000000004e2ef0 R15: 0000000000000004 08:54:05 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2a03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:05 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xa00000000000000}, 0x0) 08:54:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:05 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:05 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe00000000000000}, 0x0) 08:54:05 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xa6fb, 0x0, 0x9}, 0x0, 0xe, 0xffffffffffffffff, 0xc) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:05 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x1c00000000000000}, 0x0) 08:54:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2087.250083][T18825] __nla_validate_parse: 7 callbacks suppressed [ 2087.250093][T18825] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:05 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:05 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x2000000000000000}, 0x0) 08:54:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:06 executing program 4: r0 = gettid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="580000000206050000000000000000000600000011070300686173682a6e65742c6e6574000000000900020073797a32000000000c000780080012400100070000000500040000000000150005000a000000000000000000"], 0x58}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000000)={0x6, 'veth1_to_hsr\x00', {0x4}, 0x7}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="780000000301040026bd700013dcdf250700000a050000000000000000140016000000000800000002000073c900000003340006001400040000000000000000000000ffffac14143108000200ffffffff14000400ff0200000000000000000000000000010800030000000002"], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x20000010) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2087.520654][T18897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:06 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xfffffffffffffe19, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="000428bd70000000ffffff7f00393fe553dfcd530dbfeb48e3a8607ecc4363a1f62b96"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x53564d11e6f11f26}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x897eade574262d38, 0x70bd26, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2b03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2087.568056][T18901] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.4'. 08:54:06 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:06 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x3f00000000000000}, 0x0) 08:54:06 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="64823400000b060500000000fb210098ea00007a160000000009000780080012400000000005000100070000d3ca9a9f0b8071adde06716ef93d3a86ef63f791e33d47466f6a2733324a7c56b6c07d427ea94dd6c54ec131f8dec21f9da213a8dc36155f2979c1546353955b1084335f4c67af579306000000fce283d9c4612483d48eca52833d55b186"], 0x34}}, 0x0) unshare(0x20180) [ 2087.774171][T18988] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:06 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4000000000000000}, 0x0) 08:54:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:06 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="34215900000000000000000000000000000000000900021c73797ab4001240040072e6a73cadb734695a895bc46215f7be8c08ceb18efe53c97585ae8fbc7c55b8e3705103aff12936ac28d3e15e54a11d6ef4fc29648eda461131e539cda45c3eb8f1b4e51bf2809fd39a0331e3a1e904c6a2016ddb5c3d711f7d5a8c90bc7d60a9173b770ac78adeba39bd603a303d58798ca0b5ce5398f3664df9da1fa2305fbc0e0c02911d70b54607db33c1be118e67c3b6979f87460f91f65bd651a380b5752749c864a0c741209bee47c6"], 0x34}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/udmabuf\x00', 0x2) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r4 = accept(r3, 0x0, &(0x7f00000008c0)) recvfrom$l2tp6(r4, &(0x7f0000000900)=""/245, 0xf5, 0x61, &(0x7f0000000a00), 0x20) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {0x6}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3a1d906cd26548f}]}, 0x50}}, 0x0) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f0000000240)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0xa0000, 0x0) ioctl$VFIO_SET_IOMMU(r8, 0x3b66, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r9, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x904000}, 0x7, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x801) 08:54:06 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x565180, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000840)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x28, r4, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0xc, 0x13, @l2={'ib', 0x3a, 'lo\x00'}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x120000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x68, r4, 0x510, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0xfffffffe, @media='udp\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x404c040) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2088.101428][T19037] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:06 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4800000000000000}, 0x0) 08:54:06 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x0, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xffffffffffffff51, &(0x7f0000000000)={&(0x7f0000000080)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_REVISION={0x0, 0x4, 0x2}]}, 0x34}}, 0x0) 08:54:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2088.416458][T19057] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:07 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x4c00000000000000}, 0x0) [ 2088.563845][T19078] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x80, "dc7da1a728ca582f835f8a01c76ed179a1a0070763654cf2520a03a941ecf6ea28e3fe429d0cb5a02438a72adecd504221f49721757eb32107fa779216a0aa194187fcf20cf98a792e0e6c373f9b0de940dcf8647e50223c692a7ecc785ed47ed3bbefa3272f1324519093b2b614b56d8dffa9bd6685d78c3122d69ea292d373"}, &(0x7f0000000140)=0x88) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0xb0, 0x8}, &(0x7f00000001c0)=0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:07 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x0, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2c03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2088.738502][T19085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:07 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6000000000000000}, 0x0) [ 2088.863288][T19093] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:07 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2fd08211d8ac233ea7081aa6cbbe6d9382459363e7ccd6493fbf9054162f1a5408f05fb41ae0ecb5bd90117f827a133e8d028ced276b0e3f02105091cf4287e7b6ad6e750dfc81a65027a688cb680436e0aae9088505180d13499d7a690d498dc034c25ad4aa0a18a637d054b0433dfd29616ae47c9610d888e3309732faec"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0x5, @rand_addr="9ad6b874d80f249f1bedce2cc9b1ca8e", 0x2}]}, &(0x7f0000000100)=0x10) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000000)={0x0, 0x4, 0x4, 0x9, 0x75, 0x7}) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2088.932224][T19093] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2089.009706][T19093] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:07 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x0, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:07 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x3, {0x0, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 2089.079191][T19104] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 08:54:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:07 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6800000000000000}, 0x0) 08:54:07 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000040)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xffffffffffffffe0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x34}}, 0x0) 08:54:08 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) clone3(&(0x7f00000003c0)={0x20000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x13}, &(0x7f0000000100)=""/62, 0x3e, &(0x7f00000002c0)=""/214, &(0x7f0000000140)=[0x0], 0x1}, 0x50) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000440)={0xe, 0x1f, {0x5, 0x3, 0x5, {0x972, 0x1}, {0x1, 0xc000}, @rumble={0x9, 0x1}}, {0x55, 0x1f, 0x8000, {0x8, 0x4}, {0x1000, 0x6}, @rumble={0xc2d5, 0x3}}}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000240)=0x0) ptrace$cont(0x18, r5, 0x8, 0x40000000000000) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x6c00000000000000}, 0x0) 08:54:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:08 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x0, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:08 executing program 1: socket$caif_seqpacket(0x25, 0x5, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x300003) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x2, 0x6, 0x420, 0x70bd2a, 0x25dfdbfb, {0xd, 0x0, 0x4}, [@IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROBES={0x5, 0x15, 0x6}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x82e}, @IPSET_ATTR_PROTO={0x5, 0x7, 0xc}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0xb9}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x4840}, 0x44004) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000e6b72e726d595355320000005c080c00078008001240000000000500011d0700"/57], 0x34}}, 0x0) 08:54:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7400000000000000}, 0x0) 08:54:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x60, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:08 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x0, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:08 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x509, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x7a00000000000000}, 0x0) 08:54:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2d03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) r2 = dup(r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0xfff, 0x2, 0x81, 0x1f, 0x2, r3}) 08:54:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x300, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:08 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xc0efff7f00000000}, 0x0) 08:54:09 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x0, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:09 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000080)={0x6, "36fbe831342695361e6d38c5adfa050de40ca4780c82a94ae0a1c106b07a80b6", 0x2}) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="23218dcf43ead381163eb75ffcafa86dc67aa8abf53d38fe6c5c1dc3ac9abd69ba76d4847c5dc1fc000000000000000000000058f513bfd358ab812b2756677c8bd1682cacdd4735"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x1) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r4 = getpid() sched_setscheduler(r0, 0x6, &(0x7f0000000380)) syz_open_procfs(r4, &(0x7f0000000000)='net/snmp\x00') clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clock_getres(0x5, &(0x7f00000000c0)) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000040)=0x1) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x6, 0xbf5, 0x8, 0x3, 0x8000, 0x3, 0x8, {0x0, @in6={{0xa, 0x4e20, 0x3f, @mcast2, 0x3}}, 0xff, 0x2, 0x6, 0x8, 0x69}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e20, @local}}}, 0x84) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000000c0)={r5, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0xa5, 0x9586, 0x1, 0x1, 0x1, 0x8, 0x8, {r5, @in6={{0xa, 0x4e22, 0x9, @rand_addr="fbf32ebae9dcdbe80dc4b463f7edb80f", 0xfffffff8}}, 0x400, 0x6, 0x41, 0xffff, 0x101}}, &(0x7f0000000140)=0xb0) r7 = socket(0x15, 0x5, 0x0) getsockopt(r7, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f00000000c0)={r10, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r7, 0x84, 0x19, &(0x7f00000000c0)={r10, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000180)={r6, 0x81, 0x6, 0xfff9, 0x184, 0x0, 0x2, 0x5, {r10, @in6={{0xa, 0x4e23, 0xfffffff7, @local, 0x4}}, 0x81, 0x0, 0xe6, 0xdb, 0x2}}, &(0x7f0000000240)=0xb0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xa00, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xe4efff7f00000000}, 0x0) [ 2090.601221][T19515] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 08:54:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:09 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x0, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:09 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x100}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r2, 0x8}, 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:09 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="010500002f"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000000}, 0x0, 0xfffffffffffffffc}, 0x0, 0xff7ffffffffffffd, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xf5ffffff00000000}, 0x0) 08:54:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xb92, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2e03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2091.023940][T19637] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 08:54:09 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x0, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xe00, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xfcffffff00000000}, 0x0) 08:54:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x9, 0xb, 0x4, 0x2000, 0xfff, {r2, r3/1000+10000}, {0x0, 0xd, 0x9, 0x0, 0xaa, 0x0, "70c67313"}, 0x3ff, 0x1, @fd=r5, 0x38, 0x0, r0}) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SOUND_OLD_MIXER_INFO(r7, 0x80304d65, &(0x7f0000000240)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r10 = getuid() r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = getpid() sched_setscheduler(r13, 0x5, &(0x7f0000000380)) r14 = getpgrp(r13) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40080}, 0xc, &(0x7f0000000700)={&(0x7f0000000440)={0x298, 0x0, 0x7, 0x342, 0x70bd28, 0x25dfdbfb, {0x4, 0x0, 0xa}, [@typed={0x8, 0x6f, 0x0, 0x0, @uid=r8}, @nested={0x155, 0x3b, 0x0, 0x1, [@typed={0x8, 0x18, 0x0, 0x0, @uid=r9}, @typed={0x8, 0x29, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}, @generic="037e10b4f98063ec0dc7dda99acb727ecd27a35d727a4d8c5f44b2663105bd2f5f6efa0be780bf02cc3c31de64cf007e1636", @typed={0x8, 0x72, 0x0, 0x0, @uid=r10}, @typed={0x8, 0x70, 0x0, 0x0, @uid=r12}, @generic="b694fa3f9a97153c8dace1b7adc8c204873652273d88e3cad04da837fb0686d043a8c034ceb514fe349193dafee294ec49dd172de0bb68e215df187d55707d07ab3d00f7b665ade2ac226ef10d70e650db5821f5c40e220b4e9183988138b587d5e20367641e863677ffe08fdbc4b10cdb54a90805eba88a96d95996f0ec144f1fc03a", @typed={0x14, 0x34, 0x0, 0x0, @ipv6=@remote}, @generic="5988a82d88c061a2754583083437ac9dbcb3084ef1336d36a673aadaf378a172f80933927b10f433cdfcdf9f7bec50a77313c529b9a64e3991308db306238f2a6457b4fd52dd09bb7b32f567009c5ee4b03be7fa89da600dc30b3d5fdbedfa58", @typed={0x8, 0x19, 0x0, 0x0, @u32=0x40}]}, @generic="d5dc67b6d144d437f294dc53120c7f0ef842ba0ff1c332de51900362dfc3e63c6051febc6a45c700f68a319c07725c64f03282eb21e3f3121d5d68741b85b89b7820e6a594278a9553effeb38ab40691a86c9d61e7257103caacb3fb1b9f3fdc50c43dfd78f1f50bd1ac5c9fc0424a28fc9a4c5aef11a35a24d60e89beb9ce32e66ae7675b3eff01e364c00c56165a0f6ebc70a3c1dba49cd978255409ed53881df4a5344f80e870b5eaf7019759f3adaf6dc5", @generic="686ee1fd1845fff769e72917121a75a63488ff488297e16e65d686369ef074dc385e9f74ed95b17d127af50c0eaa2c5b64518f2a87f10b6166e24de7c55fd749520f3aafaf28cba8bbad59280e8aa53e77388938f586a95d7e4099cce05f8b7aac05e42fe76959b8eb", @typed={0x8, 0x1b, 0x0, 0x0, @pid=r14}]}, 0x298}, 0x1, 0x0, 0x0, 0x40}, 0x50010) r15 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r15, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b060500000000456fe00ed9b687e1450000000000000000000900020073797a32000000000c000780080012400000ea"], 0x34}}, 0x0) r16 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x8000) ioctl$SOUND_MIXER_INFO(r16, 0x805c4d65, &(0x7f00000001c0)) 08:54:09 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0xe, 0x0, 0x0, 0x40}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xeb3cd3d995263cd0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xffffff7f00000000}, 0x0) 08:54:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xec0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:10 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:10 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x0, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf00, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0xffffffff00000000}, 0x0) 08:54:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x2, 0xc, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x58, 0xb, 0x6, 0x5, 0x0, 0x0, {0xc, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x121801, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01008d00", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000000c0)={r6, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r6, 0xffff0001, 0x1}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r7, @in={{0x2, 0x4e22, @local}}, 0x3ff, 0x9}, 0xfffffffffffffdcb) epoll_create1(0x80000) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_PPC_GET_SMMU_INFO(r9, 0x8250aea6, &(0x7f00000003c0)=""/229) 08:54:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:10 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:10 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x4000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:10 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) [ 2092.061852][T19867] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 08:54:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x2f03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2092.243226][T19881] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2092.270684][T19881] __nla_validate_parse: 19 callbacks suppressed [ 2092.270692][T19881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x6000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2092.271310][T19867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:10 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2092.314272][T19881] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3000}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2092.414134][T19881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2092.527561][ T27] audit: type=1800 audit(1578905651.120:177): pid=19882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16488 res=0 08:54:11 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x2}, 0x0) 08:54:11 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b0000000000000000000000000000000a00a3cbe6d69ad9b8c73ffece02ca2aed5600d400000000000c0007"], 0x34}}, 0x0) 08:54:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x920b, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3001}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2092.771587][T19905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2092.843567][T19911] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2092.876743][T19911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:11 executing program 4: r0 = gettid() syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f6a299969b10b5c99b71b5b611dacc3e5108ab346b23ad2a5bb618cf271667317bcade20cda60198fa398ad2ffbde96c633f0ddf2572dbcfda59b914404aa680382cef6505550959ab78aaad4f3819e47eb58628088bb21b5edf25d74a199bbe4c742a5a2bd053053495302ed56e07b724ad0649da8760a28998f4b2d081d6a3554a6e63884715609c7fa46320f855b7c637e4f83ac377ff40da1d75e452740bf"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x0) 08:54:11 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xc00e, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2092.957243][T19905] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2092.965366][T19905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3002}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2093.046354][T19911] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2093.099129][T19911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:11 executing program 1: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0xfffffffc, 0x0, {0x2}}, 0x34}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 08:54:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:11 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x3}, 0x0) 08:54:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3003}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:12 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2093.386733][T19938] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2093.463369][T19943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2093.472035][T19944] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x34000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3100}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:12 executing program 1: ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, &(0x7f0000000080)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(r2, &(0x7f00000000c0)='./file0\x00', 0x8080, 0x101) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800240}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x208, r4, 0x134, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xffffff2a}]}]}, @TIPC_NLA_LINK={0x150, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdd4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x98}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x20010800}, 0x8808) 08:54:12 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:12 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x4}, 0x0) 08:54:12 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x40000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000000b060500000000000000000000009697ffab4a13b0900280806352c27a00000900020073797a32682c81b6e025b472000000000c00078008"], 0x34}}, 0x0) 08:54:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3101}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:12 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x5}, 0x0) [ 2094.108769][T19984] validate_nla: 6 callbacks suppressed [ 2094.108779][T19984] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x400300, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:12 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x3, @mcast1, 0xcc}, @in6={0xa, 0x4e20, 0x9, @remote, 0x10000}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x3, @empty, 0x3}, @in6={0xa, 0x4e24, 0x342d761c, @dev={0xfe, 0x80, [], 0x36}, 0x9}], 0x90) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@initdev, @in=@initdev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000c00020073797a32000000000c00078008001240000000000500010007000000"], 0x34}}, 0x0) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttynull\x00', 0x1001, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000000c0)) [ 2094.230090][T19984] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3102}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:12 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:13 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x6}, 0x0) 08:54:13 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="fa22202e2f"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x8, 0x6e, 0x6, 0xf7, 0x0, 0x10001, 0x20181, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffdf, 0x0, @perf_config_ext={0x1, 0x4}, 0x8000, 0x6, 0x100, 0x9, 0x100000000, 0xa10f, 0xd21c}, r5, 0x3, r7, 0x4) fsetxattr$trusted_overlay_opaque(r8, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x50d, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xf, r3, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf0ffff, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x30b01, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f00000000c0), 0x4) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xa, r2, &(0x7f0000000280)='.dead\x00', &(0x7f0000000340)='idt/wireless\x00') r3 = add_key(&(0x7f00000001c0)='.dead\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$9p(r5, &(0x7f0000000240)="908c74b54c6f47d3b69618e948377f67c04d21580c0baf1466070f3abdea1703e9774a18d7af19ca74117259ba098a04761d358bd2", 0x35) keyctl$clear(0x7, r3) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="34200042000000007d610000000900020073797832000000000c000784080012400994ad6f76f3a87d08e33000"], 0x34}}, 0x0) [ 2094.584924][T20007] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3103}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2094.678792][T20007] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2094.696512][T20018] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x954, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r1]}}, 0x0) 08:54:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x1000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:13 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:13 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x7}, 0x0) 08:54:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3200}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:13 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000000)=0x6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:13 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) lookup_dcookie(0x27, &(0x7f0000000340)=""/246, 0xf6) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20400}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "437a911c35a17b1343e8df15ad"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "981afba887ade26a3e0a742a59"}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000050}, 0x8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8801088}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x1, 0x9, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x0, 0x9}, [@NFCTH_POLICY={0xc, 0x4, {0x8, 0x5, 0x2}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x220000a0}, 0x810) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x30, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x6, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}}, 0x0) [ 2095.082196][T20058] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3201}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2095.176188][T20058] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:13 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2095.246464][T20066] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:14 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0xa}, 0x0) 08:54:14 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="febfefd92f"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)={0x9, 0x200, 0x1}) 08:54:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3202}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:14 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2095.602390][T20190] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x4000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2095.663610][T20190] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) lchown(&(0x7f0000000200)='./file0\x00', r1, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000000b0605010100000000000000000000000900020073797a32000000000c00078008001240000000000500010007010000ee32349ba19b9c4161cfc494eec1cf96fe485ecf0b92fef7d8baceae26b5b2dd76914a58e2929068d681e262b845efaae32925e888c4a8bc8467456c532d91e79137d6e6b7c964aa5922371ce31ee7b5b792b4dba9724365818f56af0aeec237"], 0x34}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="58000000020605000000000000000000ec00000011000300686173683a6e65742c6e6574000000000900020073797a32000000000c000780080012400000000005000100070000000500040000000000050005000a000000"], 0x58}}, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f00000000c0)={0x9a0000, 0xfffffff8, 0x4000, r5, 0x0, &(0x7f0000000080)={0x9a0913, 0x3, [], @p_u16=&(0x7f0000000040)=0x8e8}}) write$P9_RXATTRCREATE(r6, &(0x7f00000001c0)={0x7, 0x21, 0x2}, 0x7) 08:54:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3203}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:14 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0xe}, 0x0) 08:54:14 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xe000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xa) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000080)=0x1b, 0x4) 08:54:15 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="2321202e523e58d606f48a8aa96a32f844a70d66177a5d2900100000003109bfae06000000000000539d84ba0a17dc8004b2d4616d7f623be8f78cad1cb004f54a472783f481734a7e05880000000000000051a0f2395b62bfa006fce8df813eea26ffb08112c29f7977c23c67e84f440a47e76ce9f23b6b286d3b913bf73f0bcea4149a3d994e132feec77087bfc2a696d33af63c9ff69031d5ffe0c4e5fc8e1ccf4d54b05a377da6ad0c8062a78fff0344059654ad64210126bca34ff229f4ea3e9c5bc47b420c7d0701f5eb26991a5324ceb46105ecb0ee2c69b6b8b89ae1b8548f0b9f00"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x5, &(0x7f0000000480)=[{&(0x7f00000002c0)="e53f86c20677e71af31b53bea68c6f533ca28f52ffec255808f4635c040380fc8fb7b81c515d39e4e6c8a18d994520cd45c6754cf8685589aaff1d5a0d0b0495c441086b50361e96d783ab42731457fb28e6b1a9bda86bf05edb1d3041f34a4bf1d50ae67d022f032d894f1b3eb147dd55a48c3aa585e27b28673c119dd0a1b24e406f44b0f0cd3759ca3207e44ba2ffd8ce25cade334e7b76bf2bca2808f9d33207a3a8ec41f1204417b451d4131ff63230e2181b6581b5962db248176b4305e8f283e8998a10ace4d465a00efffd7d0b8f2b77e20e632cc537d5d3", 0xdc, 0x3}, {&(0x7f0000000080)="11e7dd6117fe81c55b16e003a95da8fb0b3a1b", 0x3d, 0x9}, {&(0x7f0000000100)="42b7c2743d184f6e7f1451b5e249da2b85eccb919cd731fa03ccc48a78515034e3c585be5eb07582a81ba4a9932648386861351413ef30cfbb903ff1cc0b35e3c9e4145cf56c9e3d9c21dbf4fa724fcd55247f1b7decf9f3510ea9", 0x5b, 0x5}, {&(0x7f00000003c0)="de7460d47448275a47859ab5f31502f0b734705cbe77200e81a599e9af73957ed4ece563181ec0d3056ab0798cd3db5408db41553edf9bfde2ae23a365052de5fdef734ebe61e30fa63154149d42593787831555d443e0a0b8a7af3d3c57bb39e6a7c97e946f24cad21e5121cf6549999e11f93935317927479097952b1f3d8e1929792b1498f172320fa0006541bd08f09c63e263227af8829ac25bdaa77ac3", 0xa0, 0x8}, {&(0x7f0000000240)="65606a8635e96c544f8b23c472f552faab2b9ea4f696572f5891d5aed995ecc663bd156bfcd978d0ddfe6af5191889", 0x2f, 0x800}], 0xfbe45a07e14b7b74, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3300}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x1c}, 0x0) 08:54:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000000c0)={0xbf2f, 0x3, 0x7, 0x1, 0x6, 0x10001}) r3 = socket$inet(0x2, 0x2, 0x40) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000080)={0x3, 'nr0\x00', {0x9}, 0x8000}) 08:54:15 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3301}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x48}, 0x0) 08:54:15 executing program 4: r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x800001, 0x190052, r2, 0x7) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x20, 0x70bd28, 0x25dfdbfb, {0xe, 0x0, 0x1}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x800) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x40000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3302}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:15 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000900020073797a32000000000c0007800800121189d49200c77040000000000500010007000000"], 0x34}}, 0x0) r1 = shmget$private(0x0, 0x1000, 0x10, &(0x7f0000015000/0x1000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000680)=""/73) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x4000) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) recvfrom$inet(r2, &(0x7f00000000c0)=""/255, 0xff, 0x40018020, &(0x7f00000001c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 08:54:15 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x4c}, 0x0) 08:54:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x60000000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2097.285770][T20382] __nla_validate_parse: 36 callbacks suppressed [ 2097.285779][T20382] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3303}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2097.418986][T20444] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2097.493987][T20382] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2097.507454][T20495] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:16 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2097.547649][T20444] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2097.568810][T20495] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x920b0000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:16 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x60}, 0x0) 08:54:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x2000)=nil) r1 = socket$l2tp(0x2, 0x2, 0x73) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0x7}}, 0x30) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000004940)={0x1d, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x1, 'sh\x00', 0x18, 0x0, 0x31}, 0x2c) 08:54:16 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="3315cec45bba94d70d5657bec6502a3f243e9034e01be674b4a87498a62b2b21de0b953e021159ed83600eb1ca7f108eb3eddc26d16082cdbe56bd1f2723f0edfe56f42debee485ef25fa627fa8ae3ac934c5ea7a8537d38d6d9367f22965cd6a1a336021b96ca8f645d5ae7cfd74dfd32ab1406b3056f3704746df9424919223bf1aea3c4cda00d99ec48170637799933340711808b556c26590b18c47239147162d602bd773da4b722a8c1ce2734280ac6000000000000000000000000000072cb3a89a22bb083367f0e43198878aebad95aa3c802b602"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000000)={0x4, 0x1ff, 0x0, 'queue0\x00', 0x9}) 08:54:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3400}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2097.917612][T20513] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2097.966359][T20514] IPVS: set_ctl: invalid protocol: 29 172.30.1.2:20002 [ 2097.980610][T20517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:16 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x9effffff, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2098.045338][T20513] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2098.045357][T20517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[]}}, 0x4044) 08:54:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3401}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xc00e0000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:17 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x68}, 0x0) 08:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000000b0605000000000000000000000000000900196773a60c0007010400124000000000050001000700"/59], 0x34}}, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x10040, 0x0) getsockname$tipc(r1, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000080)={0xfffffff9, 0x3, 0x1}) 08:54:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3402}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:17 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2321602e2fb1735b9c027256104d08000000000000005adbd5062dece958f8ef7f4b5ed8e469c3d66ee469548e6631b12401045ba4e8db4abb1ca854f9178cbae93c654c529fb8665f2e681d653a51c7fdd6310dc4332cf13687f884b608c5844c1f5b5d63d0439a19aef6"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000080)={0x60000, 0x0, 0x4, 0x4000000, 0x1000, {0x77359400}, {0x4, 0x2, 0x5, 0x1d, 0xf8, 0x6, "3522bf89"}, 0x4, 0x5, @userptr=0x9, 0x3ff, 0x0, r2}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x6c}, 0x0) 08:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) delete_module(&(0x7f0000000040)='\x00', 0x800) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="34002d850b0605000000000000000000000000000900020073797a320000001609de7b925fb77a000c00078008001240000000000500010007000000428ba1654e38dc0975fc552944e36745ac4fab4954dba88055752fec5975af7a260803112b0d1842f38c6d"], 0x34}}, 0x0) 08:54:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3403}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:17 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2099.131141][T20588] validate_nla: 19 callbacks suppressed [ 2099.131152][T20588] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f00000000c0)=0x4000600) [ 2099.217205][T20588] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3500}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x74}, 0x0) 08:54:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x600080, 0x0) sendto$rose(r1, &(0x7f00000000c0)="564c6ac9927157d7f38b2049dc9320b04bb4c84f1fc38b86334d1eca0faf4665e9e8cad50256947bc564712d6dba0c7fa0c2f73b06f02b9fc324d1cc130ad2e7488d6f78a0628b21bd82c74db0721101", 0x50, 0x4000000, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x6, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @bcast]}, 0x40) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:18 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000300)={0x0, 0x4, 0x4, r2, 0x0, &(0x7f00000002c0)={0x9909da, 0x8, [], @p_u16=&(0x7f0000000240)=0x2}}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2aaa00, 0x0) write$P9_RSTATFS(r5, &(0x7f0000000100)={0x43, 0x9, 0x1, {0x20, 0x7de5, 0x1, 0x3, 0x3f, 0x7, 0xbc, 0x4d44948, 0x7}}, 0x43) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2099.637206][T20644] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3501}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2099.685453][T20644] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:18 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2099.730950][T20646] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:18 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x7a}, 0x0) 08:54:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3502}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xfffffff0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000000c0)=0x39, 0x40000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000140)=0x1b, 0x4) [ 2100.235710][T20671] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:18 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:18 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="5d6b5117fcf55d8c2963831cbe09ca51bd8a4398b08c5858fd83a65edb3120148928e3f5648c94e180dea126a94822dff21249ae32b07969e87fd952a58723a34125514b4861bb1f517d1be9d18339725193b0e5c8619cf215e4c640eb0e9b76fd1444cd01cc94f2b03151508544c60c93825ac47f971a631a5f74deafb1f8"], 0x5) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80400) fsetxattr$security_ima(r2, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "e4e03d2364b66059676f00341ee9ab8a"}, 0x11, 0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ptrace$cont(0x1f, r3, 0x6, 0x3e) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2100.302835][T20691] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2100.356893][T20671] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3503}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:19 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x300}, 0x0) 08:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340080000b0605000000000000000000000000000900020073797a32000000000c00078008001240000000000500010007004000"], 0x34}}, 0x0) 08:54:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0xffffffff, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:19 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3600}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2100.718102][T20725] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2100.747653][T20725] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0xf, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:19 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x500}, 0x0) 08:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) r3 = socket(0x15, 0x5, 0x0) getsockopt(r3, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000180), &(0x7f000095dffc)=0x4) r6 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x3ff, 0x200000) ioctl$VIDIOC_ENUMSTD(r6, 0xc0485619, &(0x7f0000000280)={0x8, 0x400, "ab9bbf3c00000003b6220c00", {0x101, 0x100}, 0x6}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e24, 0x2, @mcast2, 0x2}}, 0x0, 0x0, 0x0, 0xfffffffe}, 0x9c) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000000c0)={0x0, 0x100}, 0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xfffffffd}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r7}, 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {0xc}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3601}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0xc0, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:19 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='timers\x00') ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)={0x1, 0x100000}) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="232120f42f"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 08:54:19 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:19 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x600}, 0x0) 08:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x58}}, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x9, 0x4, 0x10, 0x8, {0x0, 0x7530}, {0x8654e8577566ca82, 0xc, 0x1, 0x2, 0x40, 0x4, "01532f7e"}, 0x0, 0x3, @userptr=0x7, 0x3, 0x0, r1}) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1004000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0xe, 0x6, 0x100, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x800) 08:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3602}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0xec0, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f00000000c0)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$unix(r3, &(0x7f0000000100)=""/36, 0x24, 0x60, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 08:54:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x700}, 0x0) 08:54:20 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x33fe0, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3603}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:20 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x101000, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000000c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0xffffffff, {0x0, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0xffffffffffffffed}]}, 0x2c}}, 0x0) 08:54:20 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0xa00}, 0x0) 08:54:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x200000dc, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3700}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000100)={0x1360000, 0x401, 0x7fffffff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x1ab1cf5, 0x7f, [], @p_u16=&(0x7f0000000080)=0x2}}) ioctl$KDSETMODE(r3, 0x4b3a, 0x1) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x1000000}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x600c820}, 0x0) 08:54:20 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x2, 0xfffffffffffffe8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14}, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000400)={@rand_addr, @remote, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000d046b85cb01e92550250a490cff4300ad49be094008010bcf7bdbbd065501305f5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18979383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e493de9a33c0d1325a554cacdbe157c98bf0fd2c02e526db7e282df9be17467fcfd358fcd513ca5a786a8dff1d663acaa372b57142fd6a66ad381f9fcb119ea7b7853fa2a2ecc03c759ec1bb4050123edc3955bbebf9e9e91a8c124ca744419575825b8bad48be11521b30d3bfe10eb4e5f5191be7c04c10b893d956a6707aaa419b5f2c8f18b3f552da815eff05a975f45d16bd5542deb1399b1f041c5978c5f689989deb1ae5e2255779da15d0d687f0c59f5df7e67fde56835928a9bc6f9533cf66bd94111ce4969dc9f846d3c3c9bca01e241812b83bd18133a644b74ccbb"], 0x74}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000140)={0x0, 0x14000000, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="840000002c000107000000000000003800000000", @ANYRES32=r8, @ANYBLOB="0008008000000000030000001400010075333200580002001400050000000000000000000000000000000000400006003c000100000000000000002ea4363d35c067c5f620898dde66057433b626176af28355e194000000100000000084e1a912c5998bcbf0500000000000000000000000000002b4067277da1a290b9613a33c575c36fad473012c8f5532ef3f0e1d2c450a7d7ed15bc00b8b17beda3d51ecbf3c31a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4a61f203597905dd5411a5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3f1f27f0bb6ae000000000000000000009c22fda1f03b79936f8c8b7bc96c24e0ca4aad3290fbdb7339033834e1a6b75e20c6547d869dbdd19d13d46c7835ca37920e83f2977bd2ad9d44711cd71ac46ae37aa78fa21ceb32262105eeaf8cd34ddf19e5c4accb06b9348fdced92b6e1c60596cbc8ae679f49e349c5d2e6bfdd537f674a15ea11203ec36c91d3e4018873ec90d41dca94c4317c5cd7e52d31ee6829db9e471c0be7012a5e8fd1d54ffbe7d4449d00d94ba3cceed96b285812c7534a7b1214484711362ed5400e322b2ccd6a4eace136e3ab761cbe2b082507f3799f817642a61a384f7f505be6064a7853b828b481b9bb3a27fcdbfda91344547b50a01fd4c7742a5f8b9028adff9391ee137432e43722489a307c55215fad121994a1c3b37e620e0b89945ea586e3"], 0x84}}, 0x0) sendmmsg$sock(r2, &(0x7f0000000bc0)=[{{&(0x7f0000000480)=@ll={0x11, 0xf7, r4, 0x1, 0x1, 0x6, @broadcast}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000500)="327ccb4cdce3e35d7831c8463d7a13d2e2f3d9b1e210f7ec0d5dc69cefc00cb22ebab55a5fe70eb56b8213582622eb0327fecfdc7ffcb835ffd541a9e2573db9d328c6f8f2ab4458fa10387ab358f80235c2867dd44b0f49d47a8ef9d77a18688a252e615fce54a00b174a2f921c2da7c32f0e87c7ce58c29b2d45bb10b55310c53d12529e2b4cacd69046c3ab4c9c06348798908523e7af72503418861d225c38ef27fe6b06002e1de9b7ca8b5aa67da6822b6f9d2fd14bc16c7eb1874a5fbb55e8c75cbca7684c221feb31486ca4247fde15215b2cf18d244a680aa695c61ad68f4ee48570b7", 0xe7}], 0x1, &(0x7f0000000640)=[@timestamping={{0x14, 0x1, 0x25, 0x653}}, @timestamping={{0x14, 0x1, 0x25, 0x80}}], 0x30}}, {{&(0x7f0000000680)=@llc={0x1a, 0x33a, 0xcb, 0x26, 0x65, 0x1, @link_local}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000700)="ab0da7737895f7074f939ea94707f3fee5dbfd9ce97feba6", 0x18}, {&(0x7f0000000740)="473c98537484b09aa7d7f362cccb272c80418b33cf03c7a73ad85db38c0039cf17cc414ab029017ab3cda3de3097d0c2c8471ca91768aef69b80d58ec64d53aacb7ca3b039b2be11626e13c8e6e7cf402c176f0cac2874da04b86c1f4bc530b916aef2a1da8dcfb7908a70f347b137d58ffecca2c4ffbe9870b8d683f8b491dde6c1fdebbf36ce84330f88a82b39e125b0b7728fce5748ab006d162841a42267266ed6c9e57d82eec31e494443ea5f79ed5c2c63d481c2eff2ee", 0xba}, {&(0x7f0000000800)="4b288cc92d2d724b4dc1a2c65b8197fc49c66e89a6ddfc552a14e5dbe84b17b179c0f1b1ce9c17c92b8d0b7c2f8de82f4e422c5c74664709bb0103bb9c7b4ce8e053173a14a04503d3962bd6bc2536e994f9cd43232862d9055ed76776dea2f54f84453b677308ff1be0aa8a98518e7cd33eb4e3e9af3424620b1271a0da00a5cd8791cf7b76d65e71c8950551eb57a11f737696cea3a1801531bbca976de90a90ca267de6ea98d3a41b1f1e5cb27c58c67889b219e4b52857621ac6d95fea814088b1edf788f2d0265f8ded10c3edce2747ad0a8e842cf947fe9dddf5abb6eee7499778c17cafa220f674f8ad44a66f044f", 0xf2}, {&(0x7f0000000900)="a25e617503a6d572909a785b707c9b49941c8ad2edc8ef200bc388bcd6833347d3af9ebaeaf074121dee15aed1", 0x2d}, {&(0x7f0000000940)="fbc5c3b2e7bb4d280a6b03e2c12d96d54d7a2cea86bafd0a53d8513af4d7f3764af595ee4071bb2990ac402cb2138c18c7c81b2f8f1187116e26d2c0f22ab99f4e1ec3c3cf", 0x45}], 0x5, &(0x7f0000000a40)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x1244ef9}}, @txtime={{0x18, 0x1, 0x3d, 0x4945}}, @timestamping={{0x14}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0xfffffff9}}, @mark={{0x14, 0x1, 0x24, 0xfffffff9}}], 0xa8}}, {{&(0x7f0000000b00)=@xdp={0x2c, 0x2, r8, 0x12}, 0x80, &(0x7f0000000b80)}}], 0x3, 0x40004000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x7ffff000, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3701}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:20 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0xe00}, 0x0) 08:54:20 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b06050000000000000000000c00078008001240000000000500010007000000"], 0x34}}, 0x0) [ 2102.420529][T20959] __nla_validate_parse: 40 callbacks suppressed [ 2102.420538][T20959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0xfffffdef, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3702}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2102.514131][T21002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2102.525198][T21001] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 08:54:21 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r5, r7, 0x0, 0x3, &(0x7f0000000040)=',(\x00', 0xffffffffffffffff}, 0x30) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ptrace$setopts(0x4200, r4, 0x807, 0x2) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, {0x3f, 0x9, 0xf7, 0x3, 0xff, 0x3}, 0x7f, 0x3}, 0xe) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 2102.600248][T20959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:21 executing program 1: uselib(&(0x7f0000000080)='./file0\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDENABIO(r2, 0x4b36) 08:54:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x5, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:21 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3703}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:21 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x1c00}, 0x0) 08:54:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x6, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3800}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2102.983144][T21031] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2103.008517][T21031] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:21 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2103.056665][T21031] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x10, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:21 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x2000}, 0x0) 08:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3801}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2103.350312][T21049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2103.395740][T21052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:22 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYRES64], 0x8) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x3, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:22 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000080)={{0x1, 0x0, @identifier="6378cf1a0b722a3baf9634283dd6df99"}}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) [ 2103.496546][T21052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 08:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3802}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x3f00}, 0x0) 08:54:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0xb, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:22 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f00000002c0)=@usbdevfs_driver={0x400, 0x0, &(0x7f0000000080)="b045fe7b37d255f598941ad5dd820b9f2461c45d4a0fe6a2099adc3fdb55529284c319dad9862831ed1c9d9f715912b37b7c32eb8818ad65c48c2c232bc611ac58c6b4659afbecd1a39904a3af698c32a911fb30f22b6ac306121adff4ce1446144b9838c32c48486fe814808b820a48ba324216df0bc8616c93b7d9103f485cc2225004cad5a0be6ee99aa5876198d6fb009081479b3d7d3de48ff04ab8e1915623f7cd1313f5b414d2256cc83eb1d6cc8488c571e4cfa5735058f98c5798b159"}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000000b0605000000000000000000200000000900020073797a32000000ff7f00000200000000000000000500019b07000000"], 0x34}}, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f00000001c0)={0x4, @raw_data="22f88383975acb0e96d70c917319bdd4b644e74666cbd912c3fda1be5deef71a596ed55cba5537272c96eb16a9cf2595b55001b4886936099248a77c46160d4378c91569961845a430d913f87f90838f972de62e9c45e2dc63663f3cbd9bfc8a509b3b7531dc84bdb52a3ab0fa2677545325e38486857ed9c199747fc18dacb208768580388b8efe19bfd83a45e65713f2855e2d2671f7756622758881bbd0e9b1cd48f9e632c2bcfd334f706b460001209c47cccd2f19bbca77e7b3f5065e833683845c8171a06c"}) 08:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3803}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x4000}, 0x0) 08:54:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x38, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:22 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="05bb000000"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x34, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 08:54:22 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x4800}, 0x0) 08:54:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3900}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2104.262569][T21267] validate_nla: 27 callbacks suppressed [ 2104.262579][T21267] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:23 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 2104.372923][T21267] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x2, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:23 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x4c00}, 0x0) 08:54:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3901}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) [ 2104.657071][T21415] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:23 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x3, 0x3, 0x6}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 08:54:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x3, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2104.697535][T21415] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2104.735414][T21470] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3902}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:23 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x6000}, 0x0) 08:54:23 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:54:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x4, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2105.067086][T21530] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2105.105609][T21530] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3903}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:23 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x6800}, 0x0) 08:54:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0xa, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:24 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) [ 2105.395208][T21645] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 2105.443998][T21645] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0xe, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:24 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$SNDRV_PCM_IOCTL_PREPARE(r2, 0x4140, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x6c00}, 0x0) 08:54:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:24 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 08:54:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0xf, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2105.759501][T21665] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 08:54:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x7400}, 0x0) 08:54:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a02}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:24 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="233041e844d04b3b860411b633904165cf2c2c1bc09e15b89afddc362120499713249cad6c7275d30900000088fd982e3d174300"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x3b8f, 0x20, 0x9, 0x609bbb8d42375e17}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 08:54:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x60, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:24 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x7a00}, 0x0) 08:54:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3a03}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0xf0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:25 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./'], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_mount_image$cifs(&(0x7f0000000000)='cifs\x00', &(0x7f0000000040)='./file0\x00', 0x45c5, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="5d03b1ebdb843442a2e6a82aaf6acc14dc89eef7c93c9380e9ff3ce4111997f4c5bbbbc932fada62dff31828fe96bc6f9da8b3a25a2760f7a8b1cbc7f9c7dcd81fadb046bc93c7c799e1a9ca11638722", 0x50, 0x5}], 0x80800, &(0x7f0000000240)='trusted,-&]\x00') clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) keyctl$get_persistent(0x16, r3, 0xfffffffffffffffa) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x60, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x1000000}, 0x0) 08:54:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3b00}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0x300, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x19d, 0xa00, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 08:54:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x4c, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x3b01}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x4c}}, 0x0) 08:54:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x2000000}, 0x0) 08:54:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x3000000}, 0x0) 08:54:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x4000000}, 0x0) 08:54:25 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00005063e9cb3eadcf1e1811f000001d312ccb78ba00bccc3a48fce087bf87793affa780b1360e4be1d421dee91ed1d0391395be257093c06c9e263c94e118a904a805e84c0e768545"], 0x5) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast2, 0x4e22, 0x1, 0x4e21, 0x3ff, 0x2, 0x80, 0x80, 0xa0, 0x0, r3}, {0x6, 0x6, 0x1, 0x1, 0x7, 0x7, 0x86, 0xfffffffffffffffe}, {0xed, 0x95b2, 0x8001, 0x6}, 0x9, 0x6e6bc0, 0x55a38a6260dcab8c, 0x0, 0x1, 0x1}, {{@in=@rand_addr=0xc5dd, 0x4d3, 0x6c}, 0x2, @in6=@mcast1, 0x0, 0x2, 0x3, 0x7f, 0x10000, 0x6}}, 0xe8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 08:54:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x5000000}, 0x0) 08:54:25 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x1c}], 0x14, 0x0, 0x0, 0x6000000}, 0x0) [ 2263.206273][ T986] INFO: task syz-executor.2:21845 blocked for more than 143 seconds. [ 2263.214607][ T986] Not tainted 5.5.0-rc5-syzkaller #0 [ 2263.223116][ T986] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2263.239910][ T986] syz-executor.2 D28224 21845 9826 0x00000004 [ 2263.255898][ T986] Call Trace: [ 2263.263453][ T986] __schedule+0x934/0x1f90 [ 2263.272129][ T986] ? __sched_text_start+0x8/0x8 [ 2263.282031][ T986] ? lock_downgrade+0x920/0x920 [ 2263.293872][ T986] ? rwlock_bug.part.0+0x90/0x90 [ 2263.303141][ T986] schedule+0xdc/0x2b0 [ 2263.311240][ T986] schedule_preempt_disabled+0x13/0x20 [ 2263.320901][ T986] __mutex_lock+0x7ab/0x13c0 [ 2263.325883][ T986] ? nfnetlink_rcv_msg+0x9ee/0xfb0 [ 2263.335047][ T986] ? mutex_trylock+0x2d0/0x2d0 [ 2263.343809][ T986] ? nla_memcpy+0xb0/0xb0 [ 2263.352969][ T986] mutex_lock_nested+0x16/0x20 [ 2263.361992][ T986] ? mutex_lock_nested+0x16/0x20 [ 2263.371152][ T986] nfnetlink_rcv_msg+0x9ee/0xfb0 [ 2263.380431][ T986] ? nfnetlink_bind+0x2c0/0x2c0 [ 2263.385871][ T986] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2263.395718][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2263.411280][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2263.422114][ T986] ? cred_has_capability+0x199/0x330 [ 2263.430460][ T986] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2263.441463][ T986] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2263.451317][ T986] ? __local_bh_enable_ip+0x15a/0x270 [ 2263.461752][ T986] ? __check_heap_object+0xa3/0xb3 [ 2263.469704][ T986] netlink_rcv_skb+0x177/0x450 [ 2263.474817][ T986] ? nfnetlink_bind+0x2c0/0x2c0 [ 2263.484683][ T986] ? netlink_ack+0xb50/0xb50 [ 2263.492120][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2263.503336][ T986] ? ns_capable_common+0x93/0x100 [ 2263.511193][ T986] ? ns_capable+0x20/0x30 [ 2263.515862][ T986] ? __netlink_ns_capable+0x104/0x140 [ 2263.529030][ T986] nfnetlink_rcv+0x1ba/0x460 [ 2263.534366][ T986] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 2263.549060][ T986] ? netlink_deliver_tap+0x24a/0xbe0 [ 2263.555139][ T986] netlink_unicast+0x58c/0x7d0 [ 2263.565221][ T986] ? netlink_attachskb+0x870/0x870 [ 2263.573327][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2263.584751][ T986] netlink_sendmsg+0x91c/0xea0 [ 2263.592438][ T986] ? netlink_unicast+0x7d0/0x7d0 [ 2263.602424][ T986] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2263.610568][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2263.622061][ T986] ? security_socket_sendmsg+0x8d/0xc0 [ 2263.630324][ T986] ? netlink_unicast+0x7d0/0x7d0 [ 2263.635622][ T986] sock_sendmsg+0xd7/0x130 [ 2263.645665][ T986] ____sys_sendmsg+0x753/0x880 [ 2263.653296][ T986] ? kernel_sendmsg+0x50/0x50 [ 2263.662990][ T986] ? __fget+0x35d/0x550 [ 2263.671164][ T986] ? find_held_lock+0x35/0x130 [ 2263.676581][ T986] ___sys_sendmsg+0x100/0x170 [ 2263.681735][ T986] ? sendmsg_copy_msghdr+0x70/0x70 [ 2263.694813][ T986] ? __kasan_check_read+0x11/0x20 [ 2263.700272][ T986] ? __fget+0x37f/0x550 [ 2263.704446][ T986] ? ksys_dup3+0x3e0/0x3e0 [ 2263.716208][ T986] ? __fget_light+0x1a9/0x230 [ 2263.721312][ T986] ? __fdget+0x1b/0x20 [ 2263.725636][ T986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2263.739627][ T986] __sys_sendmsg+0x105/0x1d0 [ 2263.744636][ T986] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2263.754563][ T986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2263.763937][ T986] ? do_syscall_64+0x26/0x790 [ 2263.773870][ T986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2263.783965][ T986] ? do_syscall_64+0x26/0x790 [ 2263.792550][ T986] __x64_sys_sendmsg+0x78/0xb0 [ 2263.802239][ T986] do_syscall_64+0xfa/0x790 [ 2263.810558][ T986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2263.820291][ T986] RIP: 0033:0x45af49 [ 2263.824543][ T986] Code: e8 3c 1f 00 00 eb aa cc cc cc cc cc cc cc cc cc cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 76 40 48 83 ec 28 48 89 6c 24 20 48 <8d> 6c 24 20 48 8b 42 10 48 8b 4a 18 48 8b 52 08 48 89 14 24 48 89 [ 2263.851709][ T986] RSP: 002b:00007fcb2715bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2263.862448][ T986] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 2263.877640][ T986] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2263.886456][ T986] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2263.895482][ T986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb2715c6d4 [ 2263.911556][ T986] R13: 00000000004c9e0b R14: 00000000004e2ef0 R15: 00000000ffffffff [ 2263.921528][ T986] INFO: task syz-executor.0:21875 blocked for more than 144 seconds. [ 2263.938526][ T986] Not tainted 5.5.0-rc5-syzkaller #0 [ 2263.944758][ T986] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2263.956293][ T986] syz-executor.0 D28224 21875 9817 0x00004004 [ 2263.963321][ T986] Call Trace: [ 2263.986181][ T986] __schedule+0x934/0x1f90 [ 2263.990791][ T986] ? __sched_text_start+0x8/0x8 [ 2263.995661][ T986] ? lock_downgrade+0x920/0x920 [ 2264.000669][ T986] ? rwlock_bug.part.0+0x90/0x90 [ 2264.005657][ T986] schedule+0xdc/0x2b0 [ 2264.010272][ T986] schedule_preempt_disabled+0x13/0x20 [ 2264.015762][ T986] __mutex_lock+0x7ab/0x13c0 [ 2264.020522][ T986] ? nfnetlink_rcv_msg+0x9ee/0xfb0 [ 2264.025655][ T986] ? mutex_trylock+0x2d0/0x2d0 [ 2264.030518][ T986] ? __sanitizer_cov_trace_const_cmp4+0x1/0x20 [ 2264.036767][ T986] mutex_lock_nested+0x16/0x20 [ 2264.041541][ T986] ? mutex_lock_nested+0x16/0x20 [ 2264.046543][ T986] nfnetlink_rcv_msg+0x9ee/0xfb0 [ 2264.051504][ T986] ? nfnetlink_bind+0x2c0/0x2c0 [ 2264.056600][ T986] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2264.062341][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.068755][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.075014][ T986] ? cred_has_capability+0x199/0x330 [ 2264.080396][ T986] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2264.086045][ T986] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2264.092200][ T986] ? __local_bh_enable_ip+0x15a/0x270 [ 2264.106162][ T986] ? __check_heap_object+0xa3/0xb3 [ 2264.111366][ T986] netlink_rcv_skb+0x177/0x450 [ 2264.126164][ T986] ? nfnetlink_bind+0x2c0/0x2c0 [ 2264.131078][ T986] ? netlink_ack+0xb50/0xb50 [ 2264.135671][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.153846][ T986] ? ns_capable_common+0x93/0x100 [ 2264.159647][ T986] ? ns_capable+0x20/0x30 [ 2264.164348][ T986] ? __netlink_ns_capable+0x104/0x140 [ 2264.178116][ T986] nfnetlink_rcv+0x1ba/0x460 [ 2264.185701][ T986] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 2264.195253][ T986] ? netlink_deliver_tap+0x24a/0xbe0 [ 2264.205540][ T986] netlink_unicast+0x58c/0x7d0 [ 2264.214871][ T986] ? netlink_attachskb+0x870/0x870 [ 2264.224074][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.234302][ T986] netlink_sendmsg+0x91c/0xea0 [ 2264.242973][ T986] ? netlink_unicast+0x7d0/0x7d0 [ 2264.253054][ T986] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2264.262199][ T986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.272395][ T986] ? security_socket_sendmsg+0x8d/0xc0 [ 2264.281757][ T986] ? netlink_unicast+0x7d0/0x7d0 [ 2264.290828][ T986] sock_sendmsg+0xd7/0x130 [ 2264.296673][ T986] ____sys_sendmsg+0x753/0x880 [ 2264.301866][ T986] ? kernel_sendmsg+0x50/0x50 [ 2264.313777][ T986] ? __fget+0x35d/0x550 [ 2264.319078][ T986] ? find_held_lock+0x35/0x130 [ 2264.324471][ T986] ___sys_sendmsg+0x100/0x170 [ 2264.337566][ T986] ? sendmsg_copy_msghdr+0x70/0x70 [ 2264.345767][ T986] ? __kasan_check_read+0x11/0x20 [ 2264.361864][ T986] ? __fget+0x37f/0x550 [ 2264.366629][ T986] ? ksys_dup3+0x3e0/0x3e0 [ 2264.371359][ T986] ? __fget_light+0x1a9/0x230 [ 2264.376555][ T986] ? __fdget+0x1b/0x20 [ 2264.380842][ T986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2264.387531][ T986] __sys_sendmsg+0x105/0x1d0 [ 2264.392485][ T986] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2264.398032][ T986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2264.403945][ T986] ? do_syscall_64+0x26/0x790 [ 2264.409108][ T986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.415438][ T986] ? do_syscall_64+0x26/0x790 [ 2264.420604][ T986] __x64_sys_sendmsg+0x78/0xb0 [ 2264.425621][ T986] do_syscall_64+0xfa/0x790 [ 2264.431180][ T986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.437371][ T986] RIP: 0033:0x45af49 [ 2264.441999][ T986] Code: e8 3c 1f 00 00 eb aa cc cc cc cc cc cc cc cc cc cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 76 40 48 83 ec 28 48 89 6c 24 20 48 <8d> 6c 24 20 48 8b 42 10 48 8b 4a 18 48 8b 52 08 48 89 14 24 48 89 [ 2264.462445][ T986] RSP: 002b:00007f690e313c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2264.472560][ T986] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 2264.481124][ T986] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 2264.489697][ T986] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2264.498414][ T986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f690e3146d4 [ 2264.507040][ T986] R13: 00000000004c9d56 R14: 00000000004e2e48 R15: 00000000ffffffff [ 2264.515380][ T986] [ 2264.515380][ T986] Showing all locks held in the system: [ 2264.523728][ T986] 1 lock held by khungtaskd/986: [ 2264.529564][ T986] #0: ffffffff899a3f00 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 2264.539931][ T986] 1 lock held by rsyslogd/10250: [ 2264.545253][ T986] #0: ffff888098022860 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2264.554529][ T986] 2 locks held by getty/10372: [ 2264.559869][ T986] #0: ffff8880974a3090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.569886][ T986] #1: ffffc900019fb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.580369][ T986] 2 locks held by getty/10373: [ 2264.585477][ T986] #0: ffff888099abb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.595041][ T986] #1: ffffc90001a3b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.606191][ T986] 2 locks held by getty/10374: [ 2264.611510][ T986] #0: ffff88808fbd0090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.621247][ T986] #1: ffffc90001a5b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.631604][ T986] 2 locks held by getty/10375: [ 2264.636742][ T986] #0: ffff8880a672d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.647669][ T986] #1: ffffc90001a7b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.657770][ T986] 2 locks held by getty/10376: [ 2264.663156][ T986] #0: ffff8880967cb090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.672723][ T986] #1: ffffc90001a6b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.682886][ T986] 2 locks held by getty/10377: [ 2264.688413][ T986] #0: ffff8880a214a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.697981][ T986] #1: ffffc90001a8b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.708167][ T986] 2 locks held by getty/10378: [ 2264.713295][ T986] #0: ffff8880a2680090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2264.722974][ T986] #1: ffffc900019cb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 2264.734353][ T986] 2 locks held by syz-executor.5/21813: [ 2264.740679][ T986] 1 lock held by syz-executor.2/21845: [ 2264.746596][ T986] #0: ffffffff8c1c9290 (&table[i].mutex){+.+.}, at: nfnetlink_rcv_msg+0x9ee/0xfb0 [ 2264.757275][ T986] 1 lock held by syz-executor.0/21875: [ 2264.763078][ T986] #0: ffffffff8c1c9290 (&table[i].mutex){+.+.}, at: nfnetlink_rcv_msg+0x9ee/0xfb0 [ 2264.773217][ T986] [ 2264.775925][ T986] ============================================= [ 2264.775925][ T986] [ 2264.784957][ T986] NMI backtrace for cpu 1 [ 2264.789364][ T986] CPU: 1 PID: 986 Comm: khungtaskd Not tainted 5.5.0-rc5-syzkaller #0 [ 2264.797698][ T986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.807748][ T986] Call Trace: [ 2264.811046][ T986] dump_stack+0x197/0x210 [ 2264.815383][ T986] nmi_cpu_backtrace.cold+0x70/0xb2 [ 2264.820655][ T986] ? vprintk_func+0x86/0x189 [ 2264.825290][ T986] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2264.830929][ T986] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 2264.836918][ T986] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2264.842820][ T986] watchdog+0xb11/0x10c0 [ 2264.847136][ T986] kthread+0x361/0x430 [ 2264.851209][ T986] ? reset_hung_task_detector+0x30/0x30 [ 2264.856753][ T986] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2264.862478][ T986] ret_from_fork+0x24/0x30 [ 2264.867102][ T986] Sending NMI from CPU 1 to CPUs 0: [ 2264.873230][ C0] NMI backtrace for cpu 0 [ 2264.873236][ C0] CPU: 0 PID: 21813 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2264.873242][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2264.873246][ C0] RIP: 0010:__lock_acquire+0x156c/0x4a00 [ 2264.873256][ C0] Code: 8d 45 3f 4d 85 ed 4c 89 95 48 ff ff ff 49 0f 49 c5 48 c1 f8 06 48 8d 3c c5 e0 3c 2f 8b e8 ac fb 57 00 4c 0f a3 2d 24 b1 d4 09 <4c> 8b 95 48 ff ff ff 4c 8b 9d 40 ff ff ff 0f 82 0e f0 ff ff e8 8b [ 2264.873260][ C0] RSP: 0018:ffffc90001cb6e40 EFLAGS: 00000047 [ 2264.873268][ C0] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff815a8bb4 [ 2264.873272][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8b2f3ce0 [ 2264.873277][ C0] RBP: ffffc90001cb6f58 R08: 1ffffffff165e79c R09: fffffbfff165e79d [ 2264.873282][ C0] R10: fffffbfff165e79c R11: ffffffff8b2f3ce7 R12: 000000000000002b [ 2264.873286][ C0] R13: 000000000000002b R14: 0000000000000000 R15: 000000000002002b [ 2264.873292][ C0] FS: 00007fac13bd2700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2264.873296][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2264.873300][ C0] CR2: 000000c022b30000 CR3: 0000000090879000 CR4: 00000000001406f0 [ 2264.873305][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2264.873310][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2264.873312][ C0] Call Trace: [ 2264.873315][ C0] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2264.873318][ C0] ? mark_held_locks+0xf0/0xf0 [ 2264.873321][ C0] lock_acquire+0x190/0x410 [ 2264.873324][ C0] ? hash_netnet6_list+0x2ea/0x1380 [ 2264.873326][ C0] hash_netnet6_list+0x349/0x1380 [ 2264.873329][ C0] ? hash_netnet6_list+0x2ea/0x1380 [ 2264.873332][ C0] ? __kasan_check_read+0x11/0x20 [ 2264.873335][ C0] ? mark_held_locks+0xa4/0xf0 [ 2264.873338][ C0] ? hash_netnet4_uref+0x260/0x260 [ 2264.873341][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2264.873343][ C0] ? hash_netnet6_uref+0x16a/0x260 [ 2264.873347][ C0] ? hash_netnet4_destroy+0x120/0x120 [ 2264.873349][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 2264.873352][ C0] ? hash_netnet4_destroy+0x120/0x120 [ 2264.873355][ C0] ip_set_dump_start+0x96c/0x1ca0 [ 2264.873358][ C0] ? ip_set_rename+0x720/0x720 [ 2264.873361][ C0] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2264.873364][ C0] ? perf_trace_lock_acquire+0x4b0/0x530 [ 2264.873367][ C0] ? __kasan_check_write+0x14/0x20 [ 2264.873370][ C0] netlink_dump+0x558/0xfb0 [ 2264.873372][ C0] ? __netlink_sendskb+0xc0/0xc0 [ 2264.873375][ C0] __netlink_dump_start+0x66a/0x930 [ 2264.873378][ C0] ip_set_dump+0x15a/0x1d0 [ 2264.873380][ C0] ? call_ad+0x5a0/0x5a0 [ 2264.873383][ C0] ? ip_set_rename+0x720/0x720 [ 2264.873386][ C0] ? __ip_set_put_netlink.isra.0+0x90/0x90 [ 2264.873389][ C0] ? call_ad+0x5a0/0x5a0 [ 2264.873392][ C0] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 2264.873395][ C0] ? nfnetlink_bind+0x2c0/0x2c0 [ 2264.873398][ C0] ? avc_has_extended_perms+0x10f0/0x10f0 [ 2264.873401][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.873405][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.873408][ C0] ? cred_has_capability+0x199/0x330 [ 2264.873411][ C0] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2264.873414][ C0] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2264.873417][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 2264.873420][ C0] ? __check_heap_object+0xa3/0xb3 [ 2264.873423][ C0] netlink_rcv_skb+0x177/0x450 [ 2264.873426][ C0] ? nfnetlink_bind+0x2c0/0x2c0 [ 2264.873428][ C0] ? netlink_ack+0xb50/0xb50 [ 2264.873432][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.873434][ C0] ? ns_capable_common+0x93/0x100 [ 2264.873437][ C0] ? ns_capable+0x20/0x30 [ 2264.873440][ C0] ? __netlink_ns_capable+0x104/0x140 [ 2264.873443][ C0] nfnetlink_rcv+0x1ba/0x460 [ 2264.873446][ C0] ? nfnetlink_rcv_batch+0x17a0/0x17a0 [ 2264.873449][ C0] ? netlink_deliver_tap+0x24a/0xbe0 [ 2264.873452][ C0] netlink_unicast+0x58c/0x7d0 [ 2264.873454][ C0] ? netlink_attachskb+0x870/0x870 [ 2264.873458][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.873461][ C0] netlink_sendmsg+0x91c/0xea0 [ 2264.873463][ C0] ? netlink_unicast+0x7d0/0x7d0 [ 2264.873466][ C0] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2264.873470][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2264.873473][ C0] ? security_socket_sendmsg+0x8d/0xc0 [ 2264.873475][ C0] ? netlink_unicast+0x7d0/0x7d0 [ 2264.873478][ C0] sock_sendmsg+0xd7/0x130 [ 2264.873481][ C0] ____sys_sendmsg+0x753/0x880 [ 2264.873483][ C0] ? kernel_sendmsg+0x50/0x50 [ 2264.873486][ C0] ? __fget+0x35d/0x550 [ 2264.873489][ C0] ? find_held_lock+0x35/0x130 [ 2264.873491][ C0] ___sys_sendmsg+0x100/0x170 [ 2264.873494][ C0] ? sendmsg_copy_msghdr+0x70/0x70 [ 2264.873497][ C0] ? __kasan_check_read+0x11/0x20 [ 2264.873499][ C0] ? __fget+0x37f/0x550 [ 2264.873502][ C0] ? ksys_dup3+0x3e0/0x3e0 [ 2264.873505][ C0] ? __fget_light+0x1a9/0x230 [ 2264.873507][ C0] ? __fdget+0x1b/0x20 [ 2264.873510][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2264.873513][ C0] __sys_sendmsg+0x105/0x1d0 [ 2264.873516][ C0] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2264.873519][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2264.873521][ C0] ? do_syscall_64+0x26/0x790 [ 2264.873525][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.873527][ C0] ? do_syscall_64+0x26/0x790 [ 2264.873530][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 2264.873532][ C0] do_syscall_64+0xfa/0x790 [ 2264.873536][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2264.873538][ C0] RIP: 0033:0x45af49 [ 2264.873547][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2264.873550][ C0] RSP: 002b:00007fac13bd1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2264.873557][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 2264.873561][ C0] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2264.873565][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2264.873569][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fac13bd26d4 [ 2264.873573][ C0] R13: 00000000004c9e0b R14: 00000000004e2ef0 R15: 00000000ffffffff [ 2264.875839][ T986] Kernel panic - not syncing: hung_task: blocked tasks [ 2265.489665][ T986] CPU: 1 PID: 986 Comm: khungtaskd Not tainted 5.5.0-rc5-syzkaller #0 [ 2265.497810][ T986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2265.507864][ T986] Call Trace: [ 2265.511160][ T986] dump_stack+0x197/0x210 [ 2265.515495][ T986] panic+0x2e3/0x75c [ 2265.519395][ T986] ? add_taint.cold+0x16/0x16 [ 2265.524073][ T986] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2265.529706][ T986] ? ___preempt_schedule+0x16/0x18 [ 2265.534829][ T986] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2265.540987][ T986] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 2265.547147][ T986] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 2265.553301][ T986] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2265.559477][ T986] watchdog+0xb22/0x10c0 [ 2265.563817][ T986] kthread+0x361/0x430 [ 2265.567901][ T986] ? reset_hung_task_detector+0x30/0x30 [ 2265.573476][ T986] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2265.579221][ T986] ret_from_fork+0x24/0x30 [ 2265.585483][ T986] Kernel Offset: disabled [ 2265.589872][ T986] Rebooting in 86400 seconds..