# https://syzkaller.appspot.com/bug?id=1146d8ba066b77afe24ca840f426fe60b0492d2b # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"procs":1,"sandbox":"","fault_call":-1,"close_fds":false} r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb3dc0693cf826992}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="f40000000b06150e2cbd7000fedbdf25010000000900020073797a32000000000500010007000000080009400000d7b1a80008801c0007801800148014000240ff020000000000000000000000000001100007800c0018400000000000000007100007800a001100aaaaaaaaaaaa0000100007800900130073797a3000000000100007800c0018400000000000000003180007801400170073797a6b616c6c6572300000000000000c000780060004404e2100000c00078008001c4000007fff0c00078006001d40010000000c0007800500c626040000001c000780080009400000000206001d40f406000006001d4000040000"], 0xf4}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000)