[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.559902][ T26] audit: type=1800 audit(1579266490.985:25): pid=8523 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.580235][ T26] audit: type=1800 audit(1579266490.985:26): pid=8523 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.613135][ T26] audit: type=1800 audit(1579266490.985:27): pid=8523 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.36' (ECDSA) to the list of known hosts. 2020/01/17 13:08:21 fuzzer started 2020/01/17 13:08:23 dialing manager at 10.128.0.26:34777 2020/01/17 13:08:23 syscalls: 2851 2020/01/17 13:08:23 code coverage: enabled 2020/01/17 13:08:23 comparison tracing: enabled 2020/01/17 13:08:23 extra coverage: enabled 2020/01/17 13:08:23 setuid sandbox: enabled 2020/01/17 13:08:23 namespace sandbox: enabled 2020/01/17 13:08:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/17 13:08:23 fault injection: enabled 2020/01/17 13:08:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/17 13:08:23 net packet injection: enabled 2020/01/17 13:08:23 net device setup: enabled 2020/01/17 13:08:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/17 13:08:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 13:09:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:09:56 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) syzkaller login: [ 160.193249][ T8692] IPVS: ftp: loaded support on port[0] = 21 [ 160.292180][ T8694] IPVS: ftp: loaded support on port[0] = 21 13:09:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000080)={0x1c, 0x0, 0x5, 0x1, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x6, 0x1, '#\x00'}]}, 0x1c}}, 0x0) [ 160.392919][ T8692] chnl_net:caif_netlink_parms(): no params data found [ 160.537659][ T8692] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.551959][ T8692] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.559831][ T8692] device bridge_slave_0 entered promiscuous mode [ 160.570625][ T8694] chnl_net:caif_netlink_parms(): no params data found [ 160.586682][ T8697] IPVS: ftp: loaded support on port[0] = 21 [ 160.595327][ T8692] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.604384][ T8692] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.613556][ T8692] device bridge_slave_1 entered promiscuous mode [ 160.655026][ T8694] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.662456][ T8694] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.670428][ T8694] device bridge_slave_0 entered promiscuous mode [ 160.681237][ T8692] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 13:09:57 executing program 3: r0 = socket$nl_netfilter(0xa, 0x2, 0x88) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8, 0x0, 0xf1ebff7f}, 0x213, &(0x7f0000000000)={0x0, 0x1d2}, 0x2a}, 0x0) [ 160.703939][ T8694] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.711045][ T8694] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.721261][ T8694] device bridge_slave_1 entered promiscuous mode [ 160.730209][ T8692] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.806793][ T8694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.821255][ T8692] team0: Port device team_slave_0 added [ 160.863413][ T8694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.873871][ T8692] team0: Port device team_slave_1 added [ 160.943543][ T8697] chnl_net:caif_netlink_parms(): no params data found [ 160.947793][ T8701] IPVS: ftp: loaded support on port[0] = 21 [ 160.965830][ T8694] team0: Port device team_slave_0 added 13:09:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="240000000601c7c33d08800240000000000b006ae6d385f22ce8e37e6873d0861aa5d6f0744a050000000000379cccd531ded08ecb84481f75b2858c0000599db8e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cefe8df26bbb84bcc761de7110ce3a73fb77686e0201f5180cc6b29267f45a159a4c18d35dac2bca78dcc24be17e9c160ff1a4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda633fcdbf053630c830bb0126959591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd7770600000000000000000000000000986392fc17659719d68d45231bc852179b7608a1e916b1136c6d9337dea75a06ae04"], 0x24}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) [ 161.054487][ T8692] device hsr_slave_0 entered promiscuous mode [ 161.112184][ T8692] device hsr_slave_1 entered promiscuous mode 13:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x34a) sendto$inet(r0, &(0x7f0000000100)="3232ce2774e7a379ff48648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4", 0x69, 0xa6d53c8f55d26937, 0x0, 0xffffffbd) [ 161.207095][ T8694] team0: Port device team_slave_1 added [ 161.227111][ T8703] IPVS: ftp: loaded support on port[0] = 21 [ 161.364932][ T8694] device hsr_slave_0 entered promiscuous mode [ 161.402307][ T8694] device hsr_slave_1 entered promiscuous mode [ 161.442784][ T8694] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 161.450754][ T8694] Cannot create hsr debugfs directory [ 161.471506][ T8697] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.478720][ T8697] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.486659][ T8697] device bridge_slave_0 entered promiscuous mode [ 161.496055][ T8697] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.503184][ T8697] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.510900][ T8697] device bridge_slave_1 entered promiscuous mode [ 161.566490][ T8705] IPVS: ftp: loaded support on port[0] = 21 [ 161.589797][ T8697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.623390][ T8697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.666941][ T8692] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 161.714320][ T8692] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 161.799939][ T8703] chnl_net:caif_netlink_parms(): no params data found [ 161.818531][ T8692] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 161.909357][ T8697] team0: Port device team_slave_0 added [ 161.919179][ T8692] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 161.991423][ T8697] team0: Port device team_slave_1 added [ 161.997587][ T8694] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 162.066480][ T8701] chnl_net:caif_netlink_parms(): no params data found [ 162.099995][ T8694] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 162.145434][ T8694] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 162.219255][ T8694] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 162.333602][ T8697] device hsr_slave_0 entered promiscuous mode [ 162.382337][ T8697] device hsr_slave_1 entered promiscuous mode [ 162.422015][ T8697] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 162.429735][ T8697] Cannot create hsr debugfs directory [ 162.435423][ T8703] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.442647][ T8703] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.450394][ T8703] device bridge_slave_0 entered promiscuous mode [ 162.459585][ T8703] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.470036][ T8703] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.478119][ T8703] device bridge_slave_1 entered promiscuous mode [ 162.499320][ T8701] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.506507][ T8701] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.514665][ T8701] device bridge_slave_0 entered promiscuous mode [ 162.559388][ T8701] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.568593][ T8701] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.577133][ T8701] device bridge_slave_1 entered promiscuous mode [ 162.595396][ T8703] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.614120][ T8703] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.629904][ T8701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.643131][ T8701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.734648][ T8703] team0: Port device team_slave_0 added [ 162.747134][ T8705] chnl_net:caif_netlink_parms(): no params data found [ 162.775953][ T8703] team0: Port device team_slave_1 added [ 162.787613][ T8701] team0: Port device team_slave_0 added [ 162.795908][ T8701] team0: Port device team_slave_1 added [ 162.824573][ T8705] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.835335][ T8705] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.845820][ T8705] device bridge_slave_0 entered promiscuous mode [ 162.868671][ T8705] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.876296][ T8705] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.884576][ T8705] device bridge_slave_1 entered promiscuous mode [ 162.910600][ T8697] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 162.968347][ T8697] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 163.024322][ T8697] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 163.065447][ T8705] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.113745][ T8703] device hsr_slave_0 entered promiscuous mode [ 163.152186][ T8703] device hsr_slave_1 entered promiscuous mode [ 163.202048][ T8703] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.209638][ T8703] Cannot create hsr debugfs directory [ 163.264636][ T8701] device hsr_slave_0 entered promiscuous mode [ 163.303066][ T8701] device hsr_slave_1 entered promiscuous mode [ 163.342021][ T8701] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.349604][ T8701] Cannot create hsr debugfs directory [ 163.355759][ T8697] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 163.424345][ T8705] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.450392][ T8705] team0: Port device team_slave_0 added [ 163.475620][ T8692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.502917][ T8705] team0: Port device team_slave_1 added [ 163.531497][ T8694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.550156][ T8692] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.595196][ T8705] device hsr_slave_0 entered promiscuous mode [ 163.632287][ T8705] device hsr_slave_1 entered promiscuous mode [ 163.672054][ T8705] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.679653][ T8705] Cannot create hsr debugfs directory [ 163.692944][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.701592][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.723205][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.731019][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.759760][ T8694] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.776759][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.786032][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.794858][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.802236][ T2718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.810757][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.845476][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.856565][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.865365][ T2899] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.872535][ T2899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.880516][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.889346][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.897846][ T2899] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.904980][ T2899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.913346][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.922386][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.930751][ T2899] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.937901][ T2899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.945582][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.990872][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.005683][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.016438][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.026829][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.035846][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.044857][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.053413][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.105323][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.115526][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.124388][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.133282][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.142977][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.150860][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.160043][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.169334][ T8701] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 164.207584][ T8701] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 164.257068][ T8701] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 164.318820][ T8701] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 164.388196][ T8692] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 164.399643][ T8692] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.412670][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.421050][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.430812][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.439421][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.448014][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.456657][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.465096][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.476621][ T8703] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 164.537702][ T8703] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 164.574612][ T8703] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 164.641434][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.651739][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.662969][ T8694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.677099][ T8703] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 164.730892][ T8705] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 164.783119][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.790648][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.807362][ T8692] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.824243][ T8705] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 164.857659][ T8705] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 164.914706][ T8705] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 164.980100][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.988927][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.998033][ T8694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.049266][ T8697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.072357][ T8697] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.081354][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.090109][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.142645][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.151583][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.161229][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.170356][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.179607][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.188713][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.197598][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.204968][ T2718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.213020][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.221759][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.230322][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.237389][ T2718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.245965][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.298474][ T8694] device veth0_vlan entered promiscuous mode [ 165.305985][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.315353][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.323632][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.332249][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.340739][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.349742][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.358216][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.366957][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.399882][ T8697] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 165.410695][ T8697] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.429761][ T8692] device veth0_vlan entered promiscuous mode [ 165.437012][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.445081][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.453594][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.461465][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.469925][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.478624][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.487612][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.496282][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.505020][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.513425][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.521315][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.529369][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.543855][ T8701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.558318][ T8694] device veth1_vlan entered promiscuous mode [ 165.579669][ T8703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.595657][ T8705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.616641][ T8692] device veth1_vlan entered promiscuous mode [ 165.635360][ T8703] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.646015][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 165.656053][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 165.664543][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 165.673183][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.680725][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.688642][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.696963][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.704790][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.714787][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.726808][ T8697] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.744638][ T8701] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.768864][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 165.784587][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.794647][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.803220][ T2668] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.810434][ T2668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.843136][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.851093][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.861652][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.870415][ T2897] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.877652][ T2897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.886470][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.895832][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.904674][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.913166][ T2897] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.920382][ T2897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.955805][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.968316][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.976617][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.984986][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.994347][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.003630][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.012600][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.021113][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.029962][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.038812][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.047667][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.058834][ T8705] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.082375][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.091087][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.100726][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state 13:10:02 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 166.107883][ T2718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.117832][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.126712][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.135606][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.142864][ T2718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.152912][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.167303][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.209308][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.239878][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 13:10:02 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 166.255420][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.267007][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.281139][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.320257][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.337983][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.351388][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.360665][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 13:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 166.369192][ T2668] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.377089][ T2668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.386084][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.397278][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.405935][ T2668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 13:10:02 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 166.429050][ T8703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.449033][ T8697] device veth0_vlan entered promiscuous mode 13:10:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 166.478210][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.488296][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.503548][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.522628][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.531396][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.541330][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.550077][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.558792][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 13:10:03 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:03 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 166.577806][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.587657][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.597821][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.607238][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.622578][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.666489][ T8697] device veth1_vlan entered promiscuous mode [ 166.700885][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 166.710079][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.723944][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.736591][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.747354][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.760658][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.771266][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.784571][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.805919][ T8705] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.818747][ T8705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.840325][ T8701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.848873][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 166.862570][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.871006][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.880493][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.888348][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.897235][ T8703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.938066][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.961100][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.003810][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.015504][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 13:10:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000580)={0x40, 0xa, 0x6, 0x6d33d35a8ee63b8d, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8}}]}]}, 0x40}}, 0x0) [ 167.050350][ T8705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.087864][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.114296][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.129869][ T8701] device veth0_vlan entered promiscuous mode [ 167.148171][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.158797][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.193839][ T8701] device veth1_vlan entered promiscuous mode [ 167.250287][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 167.258714][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.267350][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.276726][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.303470][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.313468][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.322301][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.330104][ T2749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.349098][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.358448][ T2899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 13:10:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) [ 167.400102][ T8703] device veth0_vlan entered promiscuous mode [ 167.421567][ T8703] device veth1_vlan entered promiscuous mode [ 167.459129][ T8705] device veth0_vlan entered promiscuous mode [ 167.481127][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 167.497703][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.528166][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.543191][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.555713][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.563560][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.590779][ T8705] device veth1_vlan entered promiscuous mode 13:10:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0xf}, [@IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}}, 0x0) [ 167.639239][ T8773] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 167.652815][ T8774] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:04 executing program 5: r0 = socket$nl_netfilter(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0xa, 0x7a00}, 0xff5e, &(0x7f0000000100)={0x0, 0x16}}, 0x80fe) 13:10:04 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:04 executing program 2: r0 = socket$nl_netfilter(0xa, 0x2, 0x88) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2, 0x8}, 0x2e2, &(0x7f0000000040)={0x0}}, 0xc084) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000006b80)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x2}, 0x8000) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000006b80)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x2}, 0x0) 13:10:04 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:04 executing program 4: sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = socket$nl_netfilter(0xa, 0x3, 0x3a) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000600)={&(0x7f0000000680)={0xa, 0x0, 0x8e00, 0x20091ff}, 0x2bb30e2a68d4f7b6, &(0x7f00000005c0)={&(0x7f0000000280)={0x58, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x0, 0x8, 0x0, 0x1, [{0x0, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x223, 0x17, 'veth0_virt_wifi\x00'}}, {0x0, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK}, {0x0, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE}, {0xfe11, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x0, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0xfffffffffffffec6}}}]}, @IPSET_ATTR_SETNAME={0x0, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_LINENO, @IPSET_ATTR_LINENO, @IPSET_ATTR_ADT={0x0, 0x8, 0x0, 0x1, [{0x16, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2}]}, @IPSET_ATTR_ADT={0x0, 0x8, 0x0, 0x1, [{0x0, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x2a4}}]}, @IPSET_ATTR_PROTOCOL, @IPSET_ATTR_LINENO]}, 0xffd8}}, 0x0) 13:10:04 executing program 0: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000080)={0x1c, 0x8, 0x6, 0x1, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x5, 0x1, '\xaa'}]}, 0x1c}}, 0x4020) [ 167.857695][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 13:10:04 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) [ 167.913545][ T2900] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 13:10:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x12, 0x1, 0x0, 0xa000000}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x58}}, 0x0) 13:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000080)={0x30, 0x3, 0x6, 0x1, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x1c, 0x1, 'wlan1eth0[mime_typeeth1\x00'}]}, 0x30}}, 0x0) 13:10:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:04 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x4c, 0x9, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x1c, 0x8, 0x0, 0x1, [{0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x14, 0x1a, 'nodev.vmnet0em1\x00'}}]}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x0) 13:10:04 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) [ 168.147520][ T8821] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 13:10:04 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:04 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:04 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:04 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:04 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0xd, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x300}]}, 0x30}}, 0x0) 13:10:08 executing program 2: sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b292675dac2bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="70000000e707"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2000000001"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) 13:10:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 13:10:08 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) 13:10:08 executing program 1: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:08 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:10:08 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 13:10:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) [ 171.890844][ T8869] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 13:10:08 executing program 4: r0 = socket$nl_netfilter(0xa, 0x3, 0x3a) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000600)={&(0x7f0000000680)={0xa, 0x0, 0x8e00}, 0x2bb30e2a68d4f7b6, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x2}}, 0xfc00) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000600)={&(0x7f0000000680)={0xa}, 0x3dd, &(0x7f00000005c0)={&(0x7f0000000640)={0xffffffffffffffe3}, 0x2}}, 0x0) 13:10:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x101000000000001, 0x4) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) [ 172.018599][ T8883] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 13:10:08 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:08 executing program 2: r0 = socket$nl_netfilter(0xa, 0x3, 0x3a) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000600)={&(0x7f0000000680)={0xa, 0x0, 0x8e00}, 0x2bb30e2a68d4f7b6, &(0x7f00000005c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x2}}, 0xfc00) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000600)={&(0x7f0000000680)={0xa}, 0x3dd, &(0x7f00000005c0)={&(0x7f0000000640)={0xffffffffffffffe3, 0x9, 0x6, 0x0, 0x0, 0xca84}, 0xffd8}}, 0x0) 13:10:08 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 13:10:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:08 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:08 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000080)={0x28, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@NFTA_COMPAT_NAME={0x13, 0x1, '!vboxnet0-eth1\x00'}]}, 0x28}}, 0x0) 13:10:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 13:10:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000000)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}}, 0x0) [ 172.409152][ T8916] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 13:10:08 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 13:10:09 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 13:10:09 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 13:10:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:13 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x3}]}], {0x14}}, 0x6c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 13:10:13 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x3}}, 0x48}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 13:10:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c0000000101ff004000040001000000120003006269746d61703a69702c6d616300000005000100070000000900020073797a30000000000500050002000000341a6ef3a488e296600bca8447eeb0069825752b77aa813fc4ff2d1ca07656ec89c39d5b47"], 0x4c}}, 0x0) [ 176.730377][ T8961] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, 0x3}, 0x90) 13:10:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 13:10:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)={0x50, 0x2, 0x6, 0x405, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x50}}, 0x0) 13:10:13 executing program 3: sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={0x0}, 0x1, 0x604a00, 0x4}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0xb, 0x20, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x4}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x3c39a0e13dfd7fa3}, 0x40800) 13:10:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 13:10:17 executing program 2: r0 = socket$nl_netfilter(0x2, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x3}, 0x2000024c, &(0x7f0000000400)={0x0, 0x2}}, 0x0) 13:10:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) 13:10:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000f00)={0x0, 0xffffffffffffff95, &(0x7f0000000ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1300000010000100000087c037d317e8f4bb0a00da0000000b0afffffff0000000000000641b0679ac00d5c81207000000202166f03174440b9c5e9848f2c8c50ddd7f42"], 0x33fe0}}, 0x0) 13:10:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 13:10:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0xffffff0c, 0x0, 0x1c) 13:10:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x50}}, 0x0) [ 181.141716][ T9002] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 13:10:21 executing program 3: sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0x48}}, 0x0) 13:10:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0xffffff0c, 0x0, 0x1c) 13:10:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 13:10:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:21 executing program 4: sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xffffffffffffffc6, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="70000000010101002cbd700001dbdf2512c1f9000900010073797a300023000008001240000000010900050073797a30000000000900010073797a30000000000900010073797a30000000000c00044000000000000000050c0002400000000000000000000000000000df36d9b47073f78961e17219b1279c12d55921c4a71f2a49d62bdc6b81ff263152ab2caf0470b26a0599329885cfbefdac548452f756b4e796565000e7e61c460b30e879a3f40603fd11ac95d19026551cd46e9858e747735a2eff2f96d4e01f5b856c8c4d1f0cccf1b3b9e6db96e10913"], 0x70}, 0x1, 0x0, 0x0, 0x400b1}, 0x4000000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) [ 184.863712][ T9034] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 184.888823][ T9034] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 184.905963][ T9034] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 184.976833][ T9036] netlink: 'syz-executor.4': attribute type 18 has an invalid length. [ 185.008677][ T9036] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 185.039956][ T9036] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. 13:10:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000140)={0x14, 0x0, 0x2, 0x1}, 0x14}}, 0x0) 13:10:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0x48}}, 0x0) 13:10:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 13:10:21 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 13:10:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 13:10:25 executing program 3: sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 13:10:25 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0x48}}, 0x0) 13:10:25 executing program 5: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:25 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x50}}, 0x0) 13:10:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 13:10:25 executing program 5: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:25 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x50}}, 0x0) 13:10:26 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:26 executing program 5: sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:26 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0xd1, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5}]}, 0x50}}, 0x0) 13:10:26 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x2c, 0x4, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}}, 0x0) 13:10:26 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:26 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:26 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}}, 0x0) 13:10:26 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:26 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:26 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}}, 0x0) 13:10:26 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x0) 13:10:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, 0x20}}, 0x0) 13:10:26 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:26 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x0) 13:10:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 13:10:27 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0x0) 13:10:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 13:10:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:27 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 13:10:27 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x4, 0xa, 0x449, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 13:10:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:27 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:27 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 13:10:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b292675dac2bca78dc9f6a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b067066287645715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="700000700001"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2000000001"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x8}, 0x0) 13:10:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 13:10:27 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0102000000000000000000000000040004800900020002000000000000000900010073797a300000000008000340000000011400000011001b"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) [ 191.245053][ T9250] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 13:10:27 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 13:10:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 13:10:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 191.538742][ T9277] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 13:10:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000000203c7c33d0000000000e9ffffffffff0f0001000138000008000240000000000b006ae6d3d5dc53fde47e6873d0861aa5d6f0e08319f6c728f11c7b9ad03872d3f820ba6fdf6f8ad9cec56df89449ae2ac6c1487a54820cc6b2926700002bca7880756a8ef2c23f2cbda4ba4851618cbf29258bf093f2d1c6e69729af8f1f6040909bda63d9bcbf053630c830bb01269d9591d6c798e80d2c3d413605c8ac44d3f1e92f2b069ce7757945715f31dd1dd777ee6a00"/196], 0x24}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f00000003c0)={0x0, 0x373, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"/274], 0x24}}, 0x0) 13:10:28 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:28 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:28 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 13:10:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 13:10:28 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:28 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x7, 0x6, 0x701, 0x0, 0x0, {}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) 13:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:28 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:28 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={&(0x7f0000003400)={{0x14}, [@NFT_MSG_NEWSETELEM={0x2c, 0xc, 0xa, 0xc3cfdd6b542f0511, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x54}}, 0x0) 13:10:28 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 13:10:28 executing program 2: r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x14, 0x0, 0xb, 0x1}, 0x14}}, 0x0) 13:10:28 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 13:10:28 executing program 2: r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000f80)={0x4c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 13:10:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 13:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x4, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x0) 13:10:28 executing program 2: r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x4, 0x6, 0x1}, 0x14}}, 0x0) 13:10:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000070601000800004000000000000000000500010007000000947066d08ef96748c1e49d0005092af64680548f18fed7e96151e5f64e030dea654279d46f"], 0x1c}}, 0x0) 13:10:29 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 13:10:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, 0x0}, 0x0) 13:10:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x4, 0x6, 0x1}, 0x14}}, 0x0) 13:10:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:29 executing program 1: r0 = socket$nl_netfilter(0x2, 0x2, 0x11) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 13:10:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, 0x0}, 0x0) 13:10:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 13:10:29 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [], {0x14}}, 0x28}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x4, 0x6, 0x1}, 0x14}}, 0x0) 13:10:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, 0x0}, 0x0) 13:10:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x3}}, 0x48}}, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x7, 0xa, 0x58603f51b8828f83, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 13:10:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 13:10:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x7, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 13:10:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x3}}, 0x48}}, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x7, 0xa, 0x58603f51b8828f83, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 13:10:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={0x0}}, 0x0) 13:10:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:29 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x64}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 13:10:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x3}}, 0x48}}, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x7, 0xa, 0x58603f51b8828f83, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 13:10:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={0x0}}, 0x0) 13:10:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvfrom$inet(r0, &(0x7f0000000080)=""/25, 0x19, 0x0, 0x0, 0x0) 13:10:29 executing program 3: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x64}}, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0xa, 0x8}, 0x293, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000006c0000000000000000000a20000000000a01040000000000000000000000000900010073797a300000000038000000120a0100000000000000000000000000040004800900020002f5ff002000ec000900010073797a3000000000080003"], 0x1}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000001c0)={0x0, 0x241, &(0x7f0000000080)={0x0}, 0x8}, 0x0) 13:10:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={0x0}}, 0x0) 13:10:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x1, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x3}}, 0x48}}, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x7, 0xa, 0x58603f51b8828f83, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 340.612014][ T1095] INFO: task syz-executor.0:9440 blocked for more than 143 seconds. [ 340.620052][ T1095] Not tainted 5.5.0-rc6-syzkaller #0 [ 340.636061][ T1095] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 340.647546][ T1095] syz-executor.0 D28056 9440 8692 0x00004004 [ 340.666201][ T1095] Call Trace: [ 340.669774][ T1095] __schedule+0x87f/0xcd0 [ 340.680012][ T1095] schedule+0x188/0x210 [ 340.685735][ T1095] schedule_preempt_disabled+0x13/0x20 [ 340.691217][ T1095] __mutex_lock_common+0x11f1/0x2f30 [ 340.701858][ T1095] ? nfnetlink_rcv_msg+0x80d/0xcd0 [ 340.708236][ T1095] mutex_lock_nested+0x1b/0x30 [ 340.719154][ T1095] nfnetlink_rcv_msg+0x80d/0xcd0 [ 340.725623][ T1095] ? do_raw_spin_unlock+0x142/0x950 [ 340.730985][ T1095] ? cap_capable+0x25b/0x290 [ 340.741449][ T1095] ? cap_capable+0x25b/0x290 [ 340.747567][ T1095] netlink_rcv_skb+0x19e/0x3e0 [ 340.759441][ T1095] ? nfnetlink_bind+0x250/0x250 [ 340.765713][ T1095] nfnetlink_rcv+0x1e0/0x1e50 [ 340.770511][ T1095] ? __local_bh_enable_ip+0x13a/0x240 [ 340.781482][ T1095] ? local_bh_enable+0x9/0x30 [ 340.787736][ T1095] ? trace_hardirqs_on+0x74/0x80 [ 340.797983][ T1095] ? __local_bh_enable_ip+0x13a/0x240 [ 340.804838][ T1095] ? local_bh_enable+0x1f/0x30 [ 340.809664][ T1095] ? rcu_lock_release+0x9/0x30 [ 340.819501][ T1095] ? rcu_lock_release+0x21/0x30 [ 340.825800][ T1095] ? netlink_deliver_tap+0x142/0x880 [ 340.831138][ T1095] netlink_unicast+0x767/0x920 [ 340.841045][ T1095] netlink_sendmsg+0xa2c/0xd50 [ 340.849270][ T1095] ? netlink_getsockopt+0x9f0/0x9f0 [ 340.859628][ T1095] ____sys_sendmsg+0x4f7/0x7f0 [ 340.866130][ T1095] __sys_sendmsg+0x1ed/0x290 [ 340.871779][ T1095] ? check_preemption_disabled+0xb4/0x260 [ 340.883719][ T1095] ? debug_smp_processor_id+0x9/0x20 [ 340.889010][ T1095] ? debug_smp_processor_id+0x1c/0x20 [ 340.899745][ T1095] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 340.907350][ T1095] ? prepare_exit_to_usermode+0x221/0x5b0 [ 340.918354][ T1095] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 340.925663][ T1095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.931196][ T1095] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 340.943228][ T1095] ? do_syscall_64+0x1d/0x1c0 [ 340.947952][ T1095] __x64_sys_sendmsg+0x7f/0x90 [ 340.957765][ T1095] do_syscall_64+0xf7/0x1c0 [ 340.965310][ T1095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.971447][ T1095] RIP: 0033:0x45aff9 [ 340.980649][ T1095] Code: Bad RIP value. [ 340.987148][ T1095] RSP: 002b:00007f8f07ba8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 341.001280][ T1095] RAX: ffffffffffffffda RBX: 00007f8f07ba96d4 RCX: 000000000045aff9 [ 341.015665][ T1095] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 341.024820][ T1095] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 341.037812][ T1095] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 341.046956][ T1095] R13: 00000000000008c8 R14: 00000000004c9dfc R15: 000000000075bf2c [ 341.059861][ T1095] [ 341.059861][ T1095] Showing all locks held in the system: [ 341.070260][ T1095] 1 lock held by khungtaskd/1095: [ 341.084191][ T1095] #0: ffffffff890d4640 (rcu_read_lock){....}, at: rcu_lock_acquire+0x4/0x30 [ 341.098398][ T1095] 1 lock held by rsyslogd/8561: [ 341.107267][ T1095] #0: ffff8880a8fba920 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x243/0x2e0 [ 341.119194][ T1095] 2 locks held by getty/8651: [ 341.126963][ T1095] #0: ffff8880976a7090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.139390][ T1095] #1: ffffc900017772e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.161867][ T1095] 2 locks held by getty/8652: [ 341.166579][ T1095] #0: ffff8880a2e75090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.176261][ T1095] #1: ffffc9000179b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.193949][ T1095] 2 locks held by getty/8653: [ 341.198662][ T1095] #0: ffff8880a3bd6090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.212542][ T1095] #1: ffffc9000175b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.227275][ T1095] 2 locks held by getty/8654: [ 341.234076][ T1095] #0: ffff88808d35e090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.248497][ T1095] #1: ffffc900017cb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.268310][ T1095] 2 locks held by getty/8655: [ 341.274271][ T1095] #0: ffff8880a06bf090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.294931][ T1095] #1: ffffc900017ab2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.312245][ T1095] 2 locks held by getty/8656: [ 341.316959][ T1095] #0: ffff88809fbff090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.332633][ T1095] #1: ffffc900017db2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.347309][ T1095] 2 locks held by getty/8657: [ 341.353308][ T1095] #0: ffff88809f018090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 341.368934][ T1095] #1: ffffc9000172b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 341.380253][ T1095] 3 locks held by syz-executor.5/9430: [ 341.390894][ T1095] 1 lock held by syz-executor.0/9440: [ 341.397758][ T1095] #0: ffffffff8adc4fb0 (&table[i].mutex){+.+.}, at: nfnetlink_rcv_msg+0x80d/0xcd0 [ 341.414159][ T1095] [ 341.416519][ T1095] ============================================= [ 341.416519][ T1095] [ 341.429736][ T1095] NMI backtrace for cpu 0 [ 341.434182][ T1095] CPU: 0 PID: 1095 Comm: khungtaskd Not tainted 5.5.0-rc6-syzkaller #0 [ 341.442418][ T1095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.452482][ T1095] Call Trace: [ 341.455882][ T1095] dump_stack+0x1fb/0x318 [ 341.460211][ T1095] nmi_cpu_backtrace+0xaa/0x190 [ 341.465081][ T1095] ? nmi_trigger_cpumask_backtrace+0x168/0x290 [ 341.471305][ T1095] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 341.477386][ T1095] nmi_trigger_cpumask_backtrace+0x16f/0x290 [ 341.483389][ T1095] arch_trigger_cpumask_backtrace+0x10/0x20 [ 341.489511][ T1095] trigger_all_cpu_backtrace+0x17/0x20 [ 341.494990][ T1095] watchdog+0xd40/0xd60 [ 341.499256][ T1095] kthread+0x332/0x350 [ 341.503539][ T1095] ? hungtask_pm_notify+0x50/0x50 [ 341.508567][ T1095] ? kthread_blkcg+0xe0/0xe0 [ 341.513183][ T1095] ret_from_fork+0x24/0x30 [ 341.517778][ T1095] Sending NMI from CPU 0 to CPUs 1: [ 341.523349][ C1] NMI backtrace for cpu 1 [ 341.523354][ C1] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.5.0-rc6-syzkaller #0 [ 341.523359][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.523361][ C1] Workqueue: bat_events batadv_nc_worker [ 341.523366][ C1] RIP: 0010:validate_chain+0x0/0x7be0 [ 341.523373][ C1] Code: 07 80 c1 03 38 c1 0f 8c 2f ff ff ff 48 c7 c7 34 c0 44 89 e8 92 80 56 00 83 3d 0f 80 e8 07 00 0f 85 df fe ff ff e9 1a ff ff ff <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 f0 48 81 ec d0 01 [ 341.523376][ C1] RSP: 0018:ffffc90000cdfa68 EFLAGS: 00000082 [ 341.523381][ C1] RAX: 1ffffffff134b0d4 RBX: ffff8880a9de41c0 RCX: dda444d2c2f3b7bc [ 341.523385][ C1] RDX: 0000000000000000 RSI: ffff8880a9de4aa8 RDI: ffff8880a9de41c0 [ 341.523388][ C1] RBP: ffffc90000cdfbc8 R08: dffffc0000000000 R09: fffffbfff13cd11d [ 341.523391][ C1] R10: fffffbfff13cd11d R11: 0000000000000000 R12: dda444d2c2f3b7bc [ 341.523395][ C1] R13: ffff8880a9de4a50 R14: ffffffff89a586a0 R15: ffff8880a9de41c0 [ 341.523398][ C1] FS: 0000000000000000(0000) GS:ffff8880aed00000(0000) knlGS:0000000000000000 [ 341.523401][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.523405][ C1] CR2: 00007f856de40010 CR3: 00000001c8cc5000 CR4: 00000000001406e0 [ 341.523408][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 341.523418][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 341.523420][ C1] Call Trace: [ 341.523422][ C1] ? __lock_acquire+0xc5a/0x1bc0 [ 341.523425][ C1] ? trace_lock_acquire+0x15b/0x1d0 [ 341.523427][ C1] lock_acquire+0x154/0x250 [ 341.523429][ C1] ? rcu_lock_acquire+0x9/0x40 [ 341.523431][ C1] rcu_lock_acquire+0x2e/0x40 [ 341.523433][ C1] ? rcu_lock_acquire+0x9/0x40 [ 341.523436][ C1] batadv_nc_worker+0xc7/0x5f0 [ 341.523438][ C1] process_one_work+0x7f5/0x10d0 [ 341.523440][ C1] worker_thread+0xbbc/0x1630 [ 341.523442][ C1] kthread+0x332/0x350 [ 341.523445][ C1] ? rcu_lock_release+0x30/0x30 [ 341.523447][ C1] ? kthread_blkcg+0xe0/0xe0 [ 341.523449][ C1] ret_from_fork+0x24/0x30 [ 341.526315][ T1095] Kernel panic - not syncing: hung_task: blocked tasks [ 341.733550][ T1095] CPU: 0 PID: 1095 Comm: khungtaskd Not tainted 5.5.0-rc6-syzkaller #0 [ 341.741950][ T1095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.752124][ T1095] Call Trace: [ 341.755420][ T1095] dump_stack+0x1fb/0x318 [ 341.759749][ T1095] panic+0x264/0x7a9 [ 341.763645][ T1095] ? nmi_trigger_cpumask_backtrace+0x218/0x290 [ 341.769824][ T1095] watchdog+0xd53/0xd60 [ 341.774000][ T1095] kthread+0x332/0x350 [ 341.778074][ T1095] ? hungtask_pm_notify+0x50/0x50 [ 341.783214][ T1095] ? kthread_blkcg+0xe0/0xe0 [ 341.787912][ T1095] ret_from_fork+0x24/0x30 [ 341.794447][ T1095] Kernel Offset: disabled [ 341.799991][ T1095] Rebooting in 86400 seconds..