, 0x4, 0x1f, 0x1, 0x2, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}, @local, 0x20, 0x80, 0x5}}) r2 = syz_io_uring_complete(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xad}, @func, @ldst={0x2, 0x0, 0x6, 0x0, 0xa, 0x10, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000001c0)='GPL\x00', 0x1000, 0x68, &(0x7f0000000200)=""/104, 0x41100, 0x4, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x1, 0x7f, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13, 0x4c, 0x5, [@enum={0x6, 0x8, 0x0, 0x6, 0x4, [{0x5, 0xffffffff}, {0x8, 0x1}, {0xb, 0x7f}, {0x5, 0x80000001}, {0x8, 0xa}, {0xf, 0x51}, {0xe, 0x8}, {0x6, 0x3}]}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x69, 0x0, 0x1}, 0x20) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:56 executing program 1: socketpair(0x11, 0x0, 0x0, &(0x7f0000000000)) [ 776.145621][T31134] sctp: [Deprecated]: syz-executor.5 (pid 31134) Use of int in max_burst socket option. [ 776.145621][T31134] Use struct sctp_assoc_value instead 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYRES8=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYRES8=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@enum={0x2, 0x2, 0x0, 0x6, 0x4, [{0x6, 0x8001}, {0xf, 0x2}]}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x39, 0x0, 0x1, 0xffffffff}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x4, 0x1f, 0x1, 0x2, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}, @local, 0x20, 0x80, 0x5}}) (async) r2 = syz_io_uring_complete(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xad}, @func, @ldst={0x2, 0x0, 0x6, 0x0, 0xa, 0x10, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000001c0)='GPL\x00', 0x1000, 0x68, &(0x7f0000000200)=""/104, 0x41100, 0x4, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x1, 0x7f, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:56 executing program 1: socketpair(0x11, 0x0, 0x0, &(0x7f0000000000)) [ 776.200761][T31143] sctp: [Deprecated]: syz-executor.5 (pid 31143) Use of int in max_burst socket option. [ 776.200761][T31143] Use struct sctp_assoc_value instead 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000002000000000000060400000000005f00"/40], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) socketpair(0x2c, 0xa, 0x7fffffff, &(0x7f0000000000)) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYRES8=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYRES8=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:12:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@enum={0x2, 0x2, 0x0, 0x6, 0x4, [{0x6, 0x8001}, {0xf, 0x2}]}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x39, 0x0, 0x1, 0xffffffff}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x4, 0x1f, 0x1, 0x2, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}, @local, 0x20, 0x80, 0x5}}) (async) r2 = syz_io_uring_complete(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xad}, @func, @ldst={0x2, 0x0, 0x6, 0x0, 0xa, 0x10, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000001c0)='GPL\x00', 0x1000, 0x68, &(0x7f0000000200)=""/104, 0x41100, 0x4, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000340)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x1, 0x7f, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) 00:12:56 executing program 1: socketpair(0x11, 0x0, 0x0, &(0x7f0000000000)) [ 776.267179][T31160] sctp: [Deprecated]: syz-executor.5 (pid 31160) Use of int in max_burst socket option. [ 776.267179][T31160] Use struct sctp_assoc_value instead 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:56 executing program 1: socketpair(0x11, 0xa, 0x0, 0x0) 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000080)=""/49, 0x38, 0xd, 0x1}, 0x20) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) [ 776.333659][T31152] block nbd2: shutting down sockets 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000080)=""/49, 0x38, 0xd, 0x1}, 0x20) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:56 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async, rerun: 32) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:56 executing program 1: socketpair(0x11, 0xa, 0x0, 0x0) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000002000000000000060400000000005f00"/40], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) socketpair(0x2c, 0xa, 0x7fffffff, &(0x7f0000000000)) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000002000000000000060400000000005f00"/40], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)) (async) socketpair(0x2c, 0xa, 0x7fffffff, &(0x7f0000000000)) (async) syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)) (async) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) (async) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) (async) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) (async) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:56 executing program 1: socketpair(0x11, 0xa, 0x0, 0x0) 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000080)=""/49, 0x38, 0xd, 0x1}, 0x20) 00:12:56 executing program 0: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@enum={0xa, 0x6, 0x0, 0x6, 0x4, [{0x3, 0x4}, {0x6, 0x4}, {0x6, 0x6}, {0x4, 0xffffffc1}, {0x6, 0x4}, {0x2, 0x80}]}]}}, 0x0, 0x56}, 0x20) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r0, r1, 0x4, 0x1, 0x4}, 0x48) 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:56 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="9f5d3458cdb333ae260000001c0000001c000000040000000000000002e0ff060400000002000000000000006fd3900000005f5f0287a95e8b3a03005200c0cf646b085ac5d74f8a5644004f6340ecdcbb27ed06c75b2da79d34d1082c9c8ce11411fa1f05f30e7a45a6afad7383f5e71449f9216cfaeed5aa1823a845653aa95b62d56da9ea25713afda4d61d61a510d19918fc13d0aaba8e02a9abdc246708f498c493a67d25ee48e0d2440906bf"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0xff, 0xfff, 0x80, 0xb19, 0xffffffffffffffff, 0xdc8d, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r2, {0x0, 0x2}}, 0x20) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000002c0)={0xa0, 0xfffffffffffffffe, r2, {{0x4, 0x3, 0x7, 0x100000000, 0x0, 0x7, {0x1, 0x7, 0x3f, 0x101, 0x2, 0x100000000, 0x5, 0x4, 0x7, 0x1000, 0xffff, 0xee00, 0xffffffffffffffff, 0x5, 0x400}}, {0x0, 0x8}}}, 0xa0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0xfffffffffffffde7) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) setsockopt$PNPIPE_INITSTATE(r5, 0x113, 0x4, &(0x7f0000000480)=0x1, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x9, '\x00', r4, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$NBD_DO_IT(r6, 0xab03) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) r7 = syz_open_dev$ndb(&(0x7f00000004c0), 0x0, 0x107000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r7, 0xab00, r8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl0\x00', r4, 0x2f, 0x5, 0x9, 0x3, 0x1f, @local, @mcast1, 0x80, 0x40, 0xae, 0x6}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0xfffff800, '\x00', r9, r0, 0x2, 0x4, 0x5}, 0x48) r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r10, 0x0, 0x0) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r11) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) write$FUSE_LK(r10, &(0x7f0000000040)={0x28, 0x0, r2, {{0x0, 0x2, 0x2, r11}}}, 0x28) r12 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r12, 0xab00, r13) ioctl$NBD_SET_FLAGS(r12, 0xab0a, 0x6) [ 776.536566][T31214] block nbd2: shutting down sockets 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@enum={0xa, 0x6, 0x0, 0x6, 0x4, [{0x3, 0x4}, {0x6, 0x4}, {0x6, 0x6}, {0x4, 0xffffffc1}, {0x6, 0x4}, {0x2, 0x80}]}]}}, 0x0, 0x56}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@enum={0xa, 0x6, 0x0, 0x6, 0x4, [{0x3, 0x4}, {0x6, 0x4}, {0x6, 0x6}, {0x4, 0xffffffc1}, {0x6, 0x4}, {0x2, 0x80}]}]}}, 0x0, 0x56}, 0x20) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r0, r1, 0x4, 0x1, 0x4}, 0x48) 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000002000000000000060400000000005f00"/40], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) socketpair(0x2c, 0xa, 0x7fffffff, &(0x7f0000000000)) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) [ 776.595155][T31209] block nbd4: shutting down sockets 00:12:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@enum={0xa, 0x6, 0x0, 0x6, 0x4, [{0x3, 0x4}, {0x6, 0x4}, {0x6, 0x6}, {0x4, 0xffffffc1}, {0x6, 0x4}, {0x2, 0x80}]}]}}, 0x0, 0x56}, 0x20) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r0, r1, 0x4, 0x1, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@enum={0xa, 0x6, 0x0, 0x6, 0x4, [{0x3, 0x4}, {0x6, 0x4}, {0x6, 0x6}, {0x4, 0xffffffc1}, {0x6, 0x4}, {0x2, 0x80}]}]}}, 0x0, 0x56}, 0x20) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1, '\x00', r0, r1, 0x4, 0x1, 0x4}, 0x48) (async) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:56 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="9f5d3458cdb333ae260000001c0000001c000000040000000000000002e0ff060400000002000000000000006fd3900000005f5f0287a95e8b3a03005200c0cf646b085ac5d74f8a5644004f6340ecdcbb27ed06c75b2da79d34d1082c9c8ce11411fa1f05f30e7a45a6afad7383f5e71449f9216cfaeed5aa1823a845653aa95b62d56da9ea25713afda4d61d61a510d19918fc13d0aaba8e02a9abdc246708f498c493a67d25ee48e0d2440906bf"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0xff, 0xfff, 0x80, 0xb19, 0xffffffffffffffff, 0xdc8d, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r2, {0x0, 0x2}}, 0x20) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000002c0)={0xa0, 0xfffffffffffffffe, r2, {{0x4, 0x3, 0x7, 0x100000000, 0x0, 0x7, {0x1, 0x7, 0x3f, 0x101, 0x2, 0x100000000, 0x5, 0x4, 0x7, 0x1000, 0xffff, 0xee00, 0xffffffffffffffff, 0x5, 0x400}}, {0x0, 0x8}}}, 0xa0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0xfffffffffffffde7) (async) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$PNPIPE_INITSTATE(r5, 0x113, 0x4, &(0x7f0000000480)=0x1, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x9, '\x00', r4, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$NBD_DO_IT(r6, 0xab03) (async) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) r7 = syz_open_dev$ndb(&(0x7f00000004c0), 0x0, 0x107000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r7, 0xab00, r8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl0\x00', r4, 0x2f, 0x5, 0x9, 0x3, 0x1f, @local, @mcast1, 0x80, 0x40, 0xae, 0x6}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0xfffff800, '\x00', r9, r0, 0x2, 0x4, 0x5}, 0x48) (async) r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r10, 0x0, 0x0) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r11) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) (async) write$FUSE_LK(r10, &(0x7f0000000040)={0x28, 0x0, r2, {{0x0, 0x2, 0x2, r11}}}, 0x28) (async) r12 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r12, 0xab00, r13) ioctl$NBD_SET_FLAGS(r12, 0xab0a, 0x6) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) [ 776.634862][T31227] block nbd2: shutting down sockets 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) [ 776.703840][T31235] block nbd4: shutting down sockets 00:12:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="9f5d3458cdb333ae260000001c0000001c000000040000000000000002e0ff060400000002000000000000006fd3900000005f5f0287a95e8b3a03005200c0cf646b085ac5d74f8a5644004f6340ecdcbb27ed06c75b2da79d34d1082c9c8ce11411fa1f05f30e7a45a6afad7383f5e71449f9216cfaeed5aa1823a845653aa95b62d56da9ea25713afda4d61d61a510d19918fc13d0aaba8e02a9abdc246708f498c493a67d25ee48e0d2440906bf"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xf, 0xff, 0xfff, 0x80, 0xb19, 0xffffffffffffffff, 0xdc8d, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r2, {0x0, 0x2}}, 0x20) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000002c0)={0xa0, 0xfffffffffffffffe, r2, {{0x4, 0x3, 0x7, 0x100000000, 0x0, 0x7, {0x1, 0x7, 0x3f, 0x101, 0x2, 0x100000000, 0x5, 0x4, 0x7, 0x1000, 0xffff, 0xee00, 0xffffffffffffffff, 0x5, 0x400}}, {0x0, 0x8}}}, 0xa0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0xfffffffffffffde7) (async) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$PNPIPE_INITSTATE(r5, 0x113, 0x4, &(0x7f0000000480)=0x1, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x9, '\x00', r4, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$NBD_DO_IT(r6, 0xab03) (async) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) (async) r7 = syz_open_dev$ndb(&(0x7f00000004c0), 0x0, 0x107000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r7, 0xab00, r8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl0\x00', r4, 0x2f, 0x5, 0x9, 0x3, 0x1f, @local, @mcast1, 0x80, 0x40, 0xae, 0x6}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0xfffff800, '\x00', r9, r0, 0x2, 0x4, 0x5}, 0x48) r10 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r10, 0x0, 0x0) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r11) (async) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) (async) write$FUSE_LK(r10, &(0x7f0000000040)={0x28, 0x0, r2, {{0x0, 0x2, 0x2, r11}}}, 0x28) r12 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r12, 0xab00, r13) (async) ioctl$NBD_SET_FLAGS(r12, 0xab0a, 0x6) 00:12:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0xfffffffffffffffe, r1, {0x0, 0x1e}}, 0x20) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)={0x320, 0x0, r1, [{{0x0, 0x2, 0x81, 0x2, 0x1, 0x8, {0x2, 0x2, 0xfffffffffffffff9, 0x7, 0xfffffffffffffffe, 0x8, 0x7, 0x0, 0x6, 0x6000, 0x8001, 0xffffffffffffffff, 0xee01, 0x0, 0x800}}, {0x1, 0x1000, 0x0, 0x3}}, {{0x6, 0x0, 0x1, 0x9, 0x40, 0x7, {0x5, 0x7ffb, 0x800, 0x0, 0x5b, 0x5, 0x5, 0x44d9, 0x7, 0x4000, 0x2, 0xee01, 0xee01, 0x9, 0x19ce}}, {0x1, 0xff0, 0x2, 0x6, '\'-'}}, {{0x2, 0x2, 0x4, 0xffff, 0x80, 0x1ff, {0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x400000000, 0x0, 0xd1, 0x8000, 0x1000, 0x1, 0xee00, 0x0, 0x80000001, 0x1}}, {0x3, 0x7b, 0x1, 0x6, ':'}}, {{0x5, 0x0, 0x9, 0xcd57, 0x9f1a, 0x2, {0x0, 0x2002, 0x80, 0x7, 0x800, 0x0, 0xfffffffe, 0xffffffc0, 0x0, 0x6000, 0xffff, 0xffffffffffffffff, 0xee01, 0x401, 0x800000}}, {0x4, 0x1, 0x0, 0x31d}}, {{0x5, 0x0, 0xffff, 0x40000100000000, 0x34, 0x4, {0x1, 0x7, 0x3, 0x7ff, 0x8, 0x75805eb5, 0x8001, 0x1ff, 0x3, 0x4000, 0xad, 0xee01, 0xee01, 0x5}}, {0x4, 0x1, 0x3, 0x1, '\\(C'}}]}, 0x320) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) sendmsg$NFC_CMD_LLC_GET_PARAMS(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000700), 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x24, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0x5, 0x14, '#'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x8000) read$FUSE(r0, &(0x7f00000028c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) write$FUSE_BMAP(r6, &(0x7f00000006c0)={0x18, 0x0, r1, {0x9}}, 0x18) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="2803000000000000", @ANYRES64=0x0, @ANYBLOB="0400000000000000030000000000000080000000000000000000000001000000010000000500000000000000000000000900000000000000010000000100000000000000000000000700000000000000800000000000000000000000090000002000000000800000fffbffff", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="3a00000009000000000000000500000000000000000200000000000005000000c057fff72b255b2f2e0000000600000000000000000000000001000000000000090000000000000000000000c400000006000000000000003601000000000000070000000000000008000000000000000300000000000000ff01000000000000ac090000810000000500000000a000000500000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="01000000050000000000000001000000000000007f04000000000000000000001f0000000000000000000000030000000000000080810500000000000700000000000000030000000700000004000000000000006c0e0000000000000700000000000000ffffff7f000000000008000000000000ffffffffffffff7f5d00000008000000050000000060000007000000", @ANYRES32=0xee00, @ANYRES32=r3, @ANYBLOB="000001000700000000000000010000000000000055800000000000000200000000010000272d0000000000000000000000000000030000000000000003000000000000007f0000000000000000000000dc0000000400000000000000ffffffff000000000010000000000000080000000000000000000000000000001000000000000000030000007f000000b335000000400000ff010000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0500000005000000000000000000000000000000000000000000000001000000ffff00003a0000000000000006000000000000000200000000000000000000000000000001000000000000000300000000080000010000000000000000000000000000000600000000000000ff0f0000000000000100000000000000610000000000000007000000ffffffffff0f0000002000000000c001", @ANYRES32=r2, @ANYRES32=r5, @ANYBLOB="0700000078000000000000000000000000000000060000000000000005000000080000002d245b5b5e000000"], 0x328) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x16}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 00:12:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0xfffffffffffffffe, r1, {0x0, 0x1e}}, 0x20) (async, rerun: 32) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)={0x320, 0x0, r1, [{{0x0, 0x2, 0x81, 0x2, 0x1, 0x8, {0x2, 0x2, 0xfffffffffffffff9, 0x7, 0xfffffffffffffffe, 0x8, 0x7, 0x0, 0x6, 0x6000, 0x8001, 0xffffffffffffffff, 0xee01, 0x0, 0x800}}, {0x1, 0x1000, 0x0, 0x3}}, {{0x6, 0x0, 0x1, 0x9, 0x40, 0x7, {0x5, 0x7ffb, 0x800, 0x0, 0x5b, 0x5, 0x5, 0x44d9, 0x7, 0x4000, 0x2, 0xee01, 0xee01, 0x9, 0x19ce}}, {0x1, 0xff0, 0x2, 0x6, '\'-'}}, {{0x2, 0x2, 0x4, 0xffff, 0x80, 0x1ff, {0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x400000000, 0x0, 0xd1, 0x8000, 0x1000, 0x1, 0xee00, 0x0, 0x80000001, 0x1}}, {0x3, 0x7b, 0x1, 0x6, ':'}}, {{0x5, 0x0, 0x9, 0xcd57, 0x9f1a, 0x2, {0x0, 0x2002, 0x80, 0x7, 0x800, 0x0, 0xfffffffe, 0xffffffc0, 0x0, 0x6000, 0xffff, 0xffffffffffffffff, 0xee01, 0x401, 0x800000}}, {0x4, 0x1, 0x0, 0x31d}}, {{0x5, 0x0, 0xffff, 0x40000100000000, 0x34, 0x4, {0x1, 0x7, 0x3, 0x7ff, 0x8, 0x75805eb5, 0x8001, 0x1ff, 0x3, 0x4000, 0xad, 0xee01, 0xee01, 0x5}}, {0x4, 0x1, 0x3, 0x1, '\\(C'}}]}, 0x320) (async, rerun: 32) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) sendmsg$NFC_CMD_LLC_GET_PARAMS(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000700), 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x24, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0x5, 0x14, '#'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x8000) (async, rerun: 32) read$FUSE(r0, &(0x7f00000028c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) (async) write$FUSE_BMAP(r6, &(0x7f00000006c0)={0x18, 0x0, r1, {0x9}}, 0x18) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="2803000000000000", @ANYRES64=0x0, @ANYBLOB="0400000000000000030000000000000080000000000000000000000001000000010000000500000000000000000000000900000000000000010000000100000000000000000000000700000000000000800000000000000000000000090000002000000000800000fffbffff", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="3a00000009000000000000000500000000000000000200000000000005000000c057fff72b255b2f2e0000000600000000000000000000000001000000000000090000000000000000000000c400000006000000000000003601000000000000070000000000000008000000000000000300000000000000ff01000000000000ac090000810000000500000000a000000500000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="01000000050000000000000001000000000000007f04000000000000000000001f0000000000000000000000030000000000000080810500000000000700000000000000030000000700000004000000000000006c0e0000000000000700000000000000ffffff7f000000000008000000000000ffffffffffffff7f5d00000008000000050000000060000007000000", @ANYRES32=0xee00, @ANYRES32=r3, @ANYBLOB="000001000700000000000000010000000000000055800000000000000200000000010000272d0000000000000000000000000000030000000000000003000000000000007f0000000000000000000000dc0000000400000000000000ffffffff000000000010000000000000080000000000000000000000000000001000000000000000030000007f000000b335000000400000ff010000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0500000005000000000000000000000000000000000000000000000001000000ffff00003a0000000000000006000000000000000200000000000000000000000000000001000000000000000300000000080000010000000000000000000000000000000600000000000000ff0f0000000000000100000000000000610000000000000007000000ffffffffff0f0000002000000000c001", @ANYRES32=r2, @ANYRES32=r5, @ANYBLOB="0700000078000000000000000000000000000000060000000000000005000000080000002d245b5b5e000000"], 0x328) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x16}]}, {0x0, [0x61]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400ea000200000000bd6a060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x10, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0xa}, @exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x4}, @exit, @ldst={0x0, 0x0, 0x2, 0x3, 0x7, 0x10, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}], &(0x7f0000000000)='GPL\x00', 0x7, 0xda, &(0x7f0000000140)=""/218, 0x41000, 0x70, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3, 0xe, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[r2], &(0x7f0000000400)=[{0x5, 0x1, 0x4, 0xa}], 0x10, 0x4}, 0x90) syz_io_uring_setup(0x4f30, &(0x7f0000000500)={0x0, 0xc1b6, 0x0, 0x1, 0x73, 0x0, r1}, &(0x7f0000000580), &(0x7f00000005c0)) [ 776.871493][T31257] block nbd4: shutting down sockets 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x16}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:12:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0xfffffffffffffffe, r1, {0x0, 0x1e}}, 0x20) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)={0x320, 0x0, r1, [{{0x0, 0x2, 0x81, 0x2, 0x1, 0x8, {0x2, 0x2, 0xfffffffffffffff9, 0x7, 0xfffffffffffffffe, 0x8, 0x7, 0x0, 0x6, 0x6000, 0x8001, 0xffffffffffffffff, 0xee01, 0x0, 0x800}}, {0x1, 0x1000, 0x0, 0x3}}, {{0x6, 0x0, 0x1, 0x9, 0x40, 0x7, {0x5, 0x7ffb, 0x800, 0x0, 0x5b, 0x5, 0x5, 0x44d9, 0x7, 0x4000, 0x2, 0xee01, 0xee01, 0x9, 0x19ce}}, {0x1, 0xff0, 0x2, 0x6, '\'-'}}, {{0x2, 0x2, 0x4, 0xffff, 0x80, 0x1ff, {0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x400000000, 0x0, 0xd1, 0x8000, 0x1000, 0x1, 0xee00, 0x0, 0x80000001, 0x1}}, {0x3, 0x7b, 0x1, 0x6, ':'}}, {{0x5, 0x0, 0x9, 0xcd57, 0x9f1a, 0x2, {0x0, 0x2002, 0x80, 0x7, 0x800, 0x0, 0xfffffffe, 0xffffffc0, 0x0, 0x6000, 0xffff, 0xffffffffffffffff, 0xee01, 0x401, 0x800000}}, {0x4, 0x1, 0x0, 0x31d}}, {{0x5, 0x0, 0xffff, 0x40000100000000, 0x34, 0x4, {0x1, 0x7, 0x3, 0x7ff, 0x8, 0x75805eb5, 0x8001, 0x1ff, 0x3, 0x4000, 0xad, 0xee01, 0xee01, 0x5}}, {0x4, 0x1, 0x3, 0x1, '\\(C'}}]}, 0x320) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) (async, rerun: 32) sendmsg$NFC_CMD_LLC_GET_PARAMS(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000700), 0xc, &(0x7f00000027c0)={&(0x7f0000002780)={0x24, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0x5, 0x14, '#'}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}}, 0x8000) (async, rerun: 32) read$FUSE(r0, &(0x7f00000028c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) (async, rerun: 32) write$FUSE_BMAP(r6, &(0x7f00000006c0)={0x18, 0x0, r1, {0x9}}, 0x18) (async, rerun: 32) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="2803000000000000", @ANYRES64=0x0, @ANYBLOB="0400000000000000030000000000000080000000000000000000000001000000010000000500000000000000000000000900000000000000010000000100000000000000000000000700000000000000800000000000000000000000090000002000000000800000fffbffff", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="3a00000009000000000000000500000000000000000200000000000005000000c057fff72b255b2f2e0000000600000000000000000000000001000000000000090000000000000000000000c400000006000000000000003601000000000000070000000000000008000000000000000300000000000000ff01000000000000ac090000810000000500000000a000000500000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="01000000050000000000000001000000000000007f04000000000000000000001f0000000000000000000000030000000000000080810500000000000700000000000000030000000700000004000000000000006c0e0000000000000700000000000000ffffff7f000000000008000000000000ffffffffffffff7f5d00000008000000050000000060000007000000", @ANYRES32=0xee00, @ANYRES32=r3, @ANYBLOB="000001000700000000000000010000000000000055800000000000000200000000010000272d0000000000000000000000000000030000000000000003000000000000007f0000000000000000000000dc0000000400000000000000ffffffff000000000010000000000000080000000000000000000000000000001000000000000000030000007f000000b335000000400000ff010000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="0500000005000000000000000000000000000000000000000000000001000000ffff00003a0000000000000006000000000000000200000000000000000000000000000001000000000000000300000000080000010000000000000000000000000000000600000000000000ff0f0000000000000100000000000000610000000000000007000000ffffffffff0f0000002000000000c001", @ANYRES32=r2, @ANYRES32=r5, @ANYBLOB="0700000078000000000000000000000000000000060000000000000005000000080000002d245b5b5e000000"], 0x328) 00:12:56 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400ea000200000000bd6a060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x10, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0xa}, @exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x4}, @exit, @ldst={0x0, 0x0, 0x2, 0x3, 0x7, 0x10, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}], &(0x7f0000000000)='GPL\x00', 0x7, 0xda, &(0x7f0000000140)=""/218, 0x41000, 0x70, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3, 0xe, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[r2], &(0x7f0000000400)=[{0x5, 0x1, 0x4, 0xa}], 0x10, 0x4}, 0x90) (async) syz_io_uring_setup(0x4f30, &(0x7f0000000500)={0x0, 0xc1b6, 0x0, 0x1, 0x73, 0x0, r1}, &(0x7f0000000580), &(0x7f00000005c0)) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:56 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$rfkill(r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:56 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400ea000200000000bd6a060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x10, &(0x7f0000000080)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0xa}, @exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x4}, @exit, @ldst={0x0, 0x0, 0x2, 0x3, 0x7, 0x10, 0x4}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}], &(0x7f0000000000)='GPL\x00', 0x7, 0xda, &(0x7f0000000140)=""/218, 0x41000, 0x70, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3, 0xe, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[r2], &(0x7f0000000400)=[{0x5, 0x1, 0x4, 0xa}], 0x10, 0x4}, 0x90) syz_io_uring_setup(0x4f30, &(0x7f0000000500)={0x0, 0xc1b6, 0x0, 0x1, 0x73, 0x0, r1}, &(0x7f0000000580), &(0x7f00000005c0)) 00:12:56 executing program 5: socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x16}]}}, 0x0, 0x2a}, 0x20) 00:12:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:56 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$rfkill(r0, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:12:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000000000000"], 0x8) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r0, @in={{0x2, 0x4e24, @loopback}}, 0x2, 0x9}, &(0x7f0000000300)=0x90) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x9}}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x10) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="80052778d8c880b76f6aaea2f6dad863538192fa106df980197f9f046f1717dee12fdab3836543f1497457876d7aad24dc085fbedf9cf563949cbd8d426c57dc46aa2ab5580394e0b31b379ba603a04408b8bcf51865f2ebd23b113425dfa6b44da76751ade9af3cff7b784572464b2825ee85ad0b7d5baca10cbd5a9add3c218fcf3149d50fa97d452000d24a5aebc4a68c52", 0x93, 0xfffffffffffffffe) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x16}]}}, 0x0, 0x2a}, 0x20) 00:12:57 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$rfkill(r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 00:12:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000000000000"], 0x8) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r0, @in={{0x2, 0x4e24, @loopback}}, 0x2, 0x9}, &(0x7f0000000300)=0x90) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x9}}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x10) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="80052778d8c880b76f6aaea2f6dad863538192fa106df980197f9f046f1717dee12fdab3836543f1497457876d7aad24dc085fbedf9cf563949cbd8d426c57dc46aa2ab5580394e0b31b379ba603a04408b8bcf51865f2ebd23b113425dfa6b44da76751ade9af3cff7b784572464b2825ee85ad0b7d5baca10cbd5a9add3c218fcf3149d50fa97d452000d24a5aebc4a68c52", 0x93, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6f}, &(0x7f0000000200)=0x8) (async) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r0, @in={{0x2, 0x4e24, @loopback}}, 0x2, 0x9}, &(0x7f0000000300)=0x90) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x9}}, 0x18) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x10) (async) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="80052778d8c880b76f6aaea2f6dad863538192fa106df980197f9f046f1717dee12fdab3836543f1497457876d7aad24dc085fbedf9cf563949cbd8d426c57dc46aa2ab5580394e0b31b379ba603a04408b8bcf51865f2ebd23b113425dfa6b44da76751ade9af3cff7b784572464b2825ee85ad0b7d5baca10cbd5a9add3c218fcf3149d50fa97d452000d24a5aebc4a68c52", 0x93, 0xfffffffffffffffe) (async) 00:12:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) getsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000000000000"], 0x8) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, 0x16}]}}, 0x0, 0x2a}, 0x20) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x1000}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 2: setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:12:57 executing program 4: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r0, @in={{0x2, 0x4e24, @loopback}}, 0x2, 0x9}, &(0x7f0000000300)=0x90) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x9}}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x10) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="80052778d8c880b76f6aaea2f6dad863538192fa106df980197f9f046f1717dee12fdab3836543f1497457876d7aad24dc085fbedf9cf563949cbd8d426c57dc46aa2ab5580394e0b31b379ba603a04408b8bcf51865f2ebd23b113425dfa6b44da76751ade9af3cff7b784572464b2825ee85ad0b7d5baca10cbd5a9add3c218fcf3149d50fa97d452000d24a5aebc4a68c52", 0x93, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6f}, &(0x7f0000000200)=0x8) (async) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={r0, @in={{0x2, 0x4e24, @loopback}}, 0x2, 0x9}, &(0x7f0000000300)=0x90) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x9}}, 0x18) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x10) (async) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="80052778d8c880b76f6aaea2f6dad863538192fa106df980197f9f046f1717dee12fdab3836543f1497457876d7aad24dc085fbedf9cf563949cbd8d426c57dc46aa2ab5580394e0b31b379ba603a04408b8bcf51865f2ebd23b113425dfa6b44da76751ade9af3cff7b784572464b2825ee85ad0b7d5baca10cbd5a9add3c218fcf3149d50fa97d452000d24a5aebc4a68c52", 0x93, 0xfffffffffffffffe) (async) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x100, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x1000}, 0x20) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 2: setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x3f, 0x3}]}}, &(0x7f0000000000)=""/43, 0xfffffe08, 0x2b, 0x1}, 0x20) 00:12:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x1000}, 0x20) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x9}}, 0x4, 0x7}, 0x90) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 2: setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) 00:12:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r1 = syz_io_uring_complete(0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x31b, '\x00', r2, r0, 0x5, 0x4, 0x4}, 0x48) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x3f, 0x3}]}}, &(0x7f0000000000)=""/43, 0xfffffe08, 0x2b, 0x1}, 0x20) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x4, 0x7}, 0x90) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x3f, 0x3}]}}, &(0x7f0000000000)=""/43, 0xfffffe08, 0x2b, 0x1}, 0x20) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r1 = syz_io_uring_complete(0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x31b, '\x00', r2, r0, 0x5, 0x4, 0x4}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x31b, '\x00', r2, r0, 0x5, 0x4, 0x4}, 0x48) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x7}, 0x90) 00:12:57 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7f5c, 0x4, 0x5, 0x240, r0, 0x8, '\x00', r1, r0, 0x3, 0x4, 0x0, 0xa}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01f918000000000000001c0000001c000000040000000000000002000006046e19970c9aa4fd976f2000000005000000000000000100"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x2, 0x1f, 0x21, @remote, @private0, 0x78e8, 0x7, 0x3, 0xfff}}) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) 00:12:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r1 = syz_io_uring_complete(0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x31b, '\x00', r2, r0, 0x5, 0x4, 0x4}, 0x48) 00:12:57 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async, rerun: 64) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) (rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7f5c, 0x4, 0x5, 0x240, r0, 0x8, '\x00', r1, r0, 0x3, 0x4, 0x0, 0xa}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01f918000000000000001c0000001c000000040000000000000002000006046e19970c9aa4fd976f2000000005000000000000000100"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x2, 0x1f, 0x21, @remote, @private0, 0x78e8, 0x7, 0x3, 0xfff}}) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:57 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7f5c, 0x4, 0x5, 0x240, r0, 0x8, '\x00', r1, r0, 0x3, 0x4, 0x0, 0xa}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01f918000000000000001c0000001c000000040000000000000002000006046e19970c9aa4fd976f2000000005000000000000000100"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x2f, 0x1, 0x2, 0x1f, 0x21, @remote, @private0, 0x78e8, 0x7, 0x3, 0xfff}}) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7f5c, 0x4, 0x5, 0x240, r0, 0x8, '\x00', r1, r0, 0x3, 0x4, 0x0, 0xa}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000001380), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24048811) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r0) sendmsg$NFC_CMD_ENABLE_SE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0xfe54f0f212bc9953) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x6, [@restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x5}, @fwd={0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x8}}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x2}, {0x8, 0x2}, {0x6, 0x2}, {0x1}, {0x2, 0x2}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5, 0x3}, {0x8, 0x3}, {0x0, 0x5}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x80}}]}, {0x0, [0x61, 0x0, 0x30, 0x0]}}, &(0x7f0000001480)=""/4102, 0xe6, 0x1006, 0x1, 0x80000001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001300)={r4, 0x20, &(0x7f00000000c0)={&(0x7f0000001240)=""/130, 0x82, 0x0, &(0x7f0000000080)=""/8, 0x8}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)=ANY=[@ANYBLOB="090000c2", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r6, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r6, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x24008844) syz_genetlink_get_family_id$nfc(&(0x7f0000000240), r5) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%pS \x00'}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001300)=ANY=[@ANYBLOB="9feb010018000000000000007b0000007b00000003000000060000000000000c04000000470b00005b0000000100000800f8ffff0000010005000000000000001f00000004000000ffffffffff0100000100000005000000800000000339a5000000000300000d0000000002000000010000000c00000000000000020000000400000000005f00"], &(0x7f0000000240)=""/4096, 0x97, 0x1000, 0x0, 0x3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001280)={0x1b, 0x0, 0x0, 0x72ea, 0x0, r0, 0x2c8, '\x00', 0x0, r1, 0x0, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000013c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010000000000800000001c0000001c0000000200000000000000420000060400000002000000fdffffff01000000000000000000053df240eca30000000000000000"], &(0x7f00000000c0)=""/27, 0x36, 0x1b, 0x1}, 0x20) socketpair(0x27, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001440)={0x0, 0x38600000, 0x8, 0xd06d, 0x7, 0x3ff, 0x9, 0xf6e8, {0x0, @in6={{0xa, 0x4e21, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}, 0x1, 0x7, 0x1, 0x0, 0x80}}, &(0x7f0000001740)=0xb0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000016c0)={0x1b, 0x0, 0x0, 0xc104, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x4, 0x4, 0x4}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001500)=@assoc_id=r5, 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000001540)={r4, 0x2, 0x1, [0x0]}, &(0x7f0000001580)=0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x7, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x4}], &(0x7f0000001780)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0x2, 0xffffffe0}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001840)=[{0x2, 0x5, 0x4, 0x8}, {0x0, 0x4, 0xc, 0xc}, {0x0, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x10, 0x2}, {0x1, 0x5, 0x0, 0x3}, {0x0, 0x5, 0xa, 0xc}, {0x3, 0x3, 0x9, 0x7}, {0x5, 0x4, 0x1, 0x5}, {0x5, 0x2, 0x4, 0x7}], 0x10, 0x559d}, 0x90) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000015c0)={r7, 0x7fffffff, 0x1, 0x79a4, 0x4, 0x5cc, 0x401, 0xffffffff, {r5, @in6={{0xa, 0x4e24, 0x0, @local, 0xfe}}, 0x58d, 0x0, 0x3ff, 0x9, 0x9}}, &(0x7f0000001680)=0xb0) 00:12:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000000)) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}}, 0x0, 0x2a}, 0x20) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}}, 0x0, 0x2a}, 0x20) 00:12:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async, rerun: 64) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000000)) (rerun: 64) 00:12:57 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%pS \x00'}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001300)=ANY=[@ANYBLOB="9feb010018000000000000007b0000007b00000003000000060000000000000c04000000470b00005b0000000100000800f8ffff0000010005000000000000001f00000004000000ffffffffff0100000100000005000000800000000339a5000000000300000d0000000002000000010000000c00000000000000020000000400000000005f00"], &(0x7f0000000240)=""/4096, 0x97, 0x1000, 0x0, 0x3}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001280)={0x1b, 0x0, 0x0, 0x72ea, 0x0, r0, 0x2c8, '\x00', 0x0, r1, 0x0, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000013c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010000000000800000001c0000001c0000000200000000000000420000060400000002000000fdffffff01000000000000000000053df240eca30000000000000000"], &(0x7f00000000c0)=""/27, 0x36, 0x1b, 0x1}, 0x20) socketpair(0x27, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001440)={0x0, 0x38600000, 0x8, 0xd06d, 0x7, 0x3ff, 0x9, 0xf6e8, {0x0, @in6={{0xa, 0x4e21, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}, 0x1, 0x7, 0x1, 0x0, 0x80}}, &(0x7f0000001740)=0xb0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000016c0)={0x1b, 0x0, 0x0, 0xc104, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x4, 0x4, 0x4}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001500)=@assoc_id=r5, 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000001540)={r4, 0x2, 0x1, [0x0]}, &(0x7f0000001580)=0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x7, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x4}], &(0x7f0000001780)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0x2, 0xffffffe0}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001840)=[{0x2, 0x5, 0x4, 0x8}, {0x0, 0x4, 0xc, 0xc}, {0x0, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x10, 0x2}, {0x1, 0x5, 0x0, 0x3}, {0x0, 0x5, 0xa, 0xc}, {0x3, 0x3, 0x9, 0x7}, {0x5, 0x4, 0x1, 0x5}, {0x5, 0x2, 0x4, 0x7}], 0x10, 0x559d}, 0x90) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000015c0)={r7, 0x7fffffff, 0x1, 0x79a4, 0x4, 0x5cc, 0x401, 0xffffffff, {r5, @in6={{0xa, 0x4e24, 0x0, @local, 0xfe}}, 0x58d, 0x0, 0x3ff, 0x9, 0x9}}, &(0x7f0000001680)=0xb0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0x1}, &(0x7f0000000000), &(0x7f0000000080)='%pS \x00'}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001300)=ANY=[@ANYBLOB="9feb010018000000000000007b0000007b00000003000000060000000000000c04000000470b00005b0000000100000800f8ffff0000010005000000000000001f00000004000000ffffffffff0100000100000005000000800000000339a5000000000300000d0000000002000000010000000c00000000000000020000000400000000005f00"], &(0x7f0000000240)=""/4096, 0x97, 0x1000, 0x0, 0x3}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001280)={0x1b, 0x0, 0x0, 0x72ea, 0x0, r0, 0x2c8, '\x00', 0x0, r1, 0x0, 0x2, 0x5}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000013c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010000000000800000001c0000001c0000000200000000000000420000060400000002000000fdffffff01000000000000000000053df240eca30000000000000000"], &(0x7f00000000c0)=""/27, 0x36, 0x1b, 0x1}, 0x20) (async) socketpair(0x27, 0x2, 0x4, &(0x7f0000000040)) (async) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001440)={0x0, 0x38600000, 0x8, 0xd06d, 0x7, 0x3ff, 0x9, 0xf6e8, {0x0, @in6={{0xa, 0x4e21, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}, 0x1, 0x7, 0x1, 0x0, 0x80}}, &(0x7f0000001740)=0xb0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000016c0)={0x1b, 0x0, 0x0, 0xc104, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x4, 0x4, 0x4}, 0x48) (async) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001500)=@assoc_id=r5, 0x4) (async) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000001540)={r4, 0x2, 0x1, [0x0]}, &(0x7f0000001580)=0xa) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x7, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x4}], &(0x7f0000001780)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0x2, 0xffffffe0}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001840)=[{0x2, 0x5, 0x4, 0x8}, {0x0, 0x4, 0xc, 0xc}, {0x0, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x10, 0x2}, {0x1, 0x5, 0x0, 0x3}, {0x0, 0x5, 0xa, 0xc}, {0x3, 0x3, 0x9, 0x7}, {0x5, 0x4, 0x1, 0x5}, {0x5, 0x2, 0x4, 0x7}], 0x10, 0x559d}, 0x90) (async) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000015c0)={r7, 0x7fffffff, 0x1, 0x79a4, 0x4, 0x5cc, 0x401, 0xffffffff, {r5, @in6={{0xa, 0x4e24, 0x0, @local, 0xfe}}, 0x58d, 0x0, 0x3ff, 0x9, 0x9}}, &(0x7f0000001680)=0xb0) (async) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000001380), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24048811) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r0) sendmsg$NFC_CMD_ENABLE_SE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0xfe54f0f212bc9953) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x6, [@restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x5}, @fwd={0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x8}}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x2}, {0x8, 0x2}, {0x6, 0x2}, {0x1}, {0x2, 0x2}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5, 0x3}, {0x8, 0x3}, {0x0, 0x5}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x80}}]}, {0x0, [0x61, 0x0, 0x30, 0x0]}}, &(0x7f0000001480)=""/4102, 0xe6, 0x1006, 0x1, 0x80000001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001300)={r4, 0x20, &(0x7f00000000c0)={&(0x7f0000001240)=""/130, 0x82, 0x0, &(0x7f0000000080)=""/8, 0x8}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)=ANY=[@ANYBLOB="090000c2", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x14}}, 0x0) (async) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r6, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r6, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x24008844) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000240), r5) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x61]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:57 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%pS \x00'}, 0x20) (async, rerun: 64) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001300)=ANY=[@ANYBLOB="9feb010018000000000000007b0000007b00000003000000060000000000000c04000000470b00005b0000000100000800f8ffff0000010005000000000000001f00000004000000ffffffffff0100000100000005000000800000000339a5000000000300000d0000000002000000010000000c00000000000000020000000400000000005f00"], &(0x7f0000000240)=""/4096, 0x97, 0x1000, 0x0, 0x3}, 0x20) (rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001280)={0x1b, 0x0, 0x0, 0x72ea, 0x0, r0, 0x2c8, '\x00', 0x0, r1, 0x0, 0x2, 0x5}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000013c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010000000000800000001c0000001c0000000200000000000000420000060400000002000000fdffffff01000000000000000000053df240eca30000000000000000"], &(0x7f00000000c0)=""/27, 0x36, 0x1b, 0x1}, 0x20) (async, rerun: 32) socketpair(0x27, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001440)={0x0, 0x38600000, 0x8, 0xd06d, 0x7, 0x3ff, 0x9, 0xf6e8, {0x0, @in6={{0xa, 0x4e21, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}, 0x1, 0x7, 0x1, 0x0, 0x80}}, &(0x7f0000001740)=0xb0) (async, rerun: 64) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000016c0)={0x1b, 0x0, 0x0, 0xc104, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x4, 0x4, 0x4}, 0x48) (async) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000001500)=@assoc_id=r5, 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000001540)={r4, 0x2, 0x1, [0x0]}, &(0x7f0000001580)=0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x11, 0x7, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0x7, 0x4, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x4}], &(0x7f0000001780)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001800)={0x5, 0x2, 0xffffffe0}, 0x10, 0x0, 0x0, 0x9, 0x0, &(0x7f0000001840)=[{0x2, 0x5, 0x4, 0x8}, {0x0, 0x4, 0xc, 0xc}, {0x0, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x10, 0x2}, {0x1, 0x5, 0x0, 0x3}, {0x0, 0x5, 0xa, 0xc}, {0x3, 0x3, 0x9, 0x7}, {0x5, 0x4, 0x1, 0x5}, {0x5, 0x2, 0x4, 0x7}], 0x10, 0x559d}, 0x90) (async) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000015c0)={r7, 0x7fffffff, 0x1, 0x79a4, 0x4, 0x5cc, 0x401, 0xffffffff, {r5, @in6={{0xa, 0x4e24, 0x0, @local, 0xfe}}, 0x58d, 0x0, 0x3ff, 0x9, 0x9}}, &(0x7f0000001680)=0xb0) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}}, 0x0, 0x2a}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x61]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:12:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000001380), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24048811) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r0) sendmsg$NFC_CMD_ENABLE_SE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0xfe54f0f212bc9953) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x6, [@restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x5}, @fwd={0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x8}}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x2}, {0x8, 0x2}, {0x6, 0x2}, {0x1}, {0x2, 0x2}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5, 0x3}, {0x8, 0x3}, {0x0, 0x5}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x80}}]}, {0x0, [0x61, 0x0, 0x30, 0x0]}}, &(0x7f0000001480)=""/4102, 0xe6, 0x1006, 0x1, 0x80000001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001300)={r4, 0x20, &(0x7f00000000c0)={&(0x7f0000001240)=""/130, 0x82, 0x0, &(0x7f0000000080)=""/8, 0x8}}, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)=ANY=[@ANYBLOB="090000c2", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r6, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r6, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x24008844) syz_genetlink_get_family_id$nfc(&(0x7f0000000240), r5) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000001380), 0xffffffffffffffff) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24048811) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) syz_genetlink_get_family_id$nfc(&(0x7f00000002c0), r0) (async) sendmsg$NFC_CMD_ENABLE_SE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0xfe54f0f212bc9953) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x6, [@restrict={0x9, 0x0, 0x0, 0xb, 0x5}, @var={0xb, 0x0, 0x0, 0xe, 0x5}, @fwd={0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x8}}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x2}, {0x8, 0x2}, {0x6, 0x2}, {0x1}, {0x2, 0x2}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5, 0x3}, {0x8, 0x3}, {0x0, 0x5}]}, @volatile={0xb, 0x0, 0x0, 0x9, 0x4}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x80}}]}, {0x0, [0x61, 0x0, 0x30, 0x0]}}, &(0x7f0000001480)=""/4102, 0xe6, 0x1006, 0x1, 0x80000001}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001300)={r4, 0x20, &(0x7f00000000c0)={&(0x7f0000001240)=""/130, 0x82, 0x0, &(0x7f0000000080)=""/8, 0x8}}, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)=ANY=[@ANYBLOB="090000c2", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x14}}, 0x0) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r6, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) (async) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r6, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x24008844) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000240), r5) (async) 00:12:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f0000000000)) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0xb, 0x1b, 0x1}, 0x20) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x1000}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x61]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:57 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff0d, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NFC_CMD_LLC_GET_PARAMS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '{\'-@#'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x5, 0x14, '\x00'}]}, 0x38}}, 0x4001) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x16}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x2d, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0xb, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0xb, 0x1b, 0x1}, 0x20) (async) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0xb, 0x1b, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff0d, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NFC_CMD_LLC_GET_PARAMS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '{\'-@#'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x5, 0x14, '\x00'}]}, 0x38}}, 0x4001) 00:12:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff0d, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async, rerun: 32) r0 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), 0xffffffffffffffff) (rerun: 32) sendmsg$NFC_CMD_LLC_GET_PARAMS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_FIRMWARE_NAME={0x9, 0x14, '{\'-@#'}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_FIRMWARE_NAME={0x5, 0x14, '\x00'}]}, 0x38}}, 0x4001) 00:12:57 executing program 4: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:57 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:57 executing program 4: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:12:57 executing program 4: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:57 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:58 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") (rerun: 32) write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000001e0000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000050000000200000006000006040000000e00000006000000050000000800000000000000020000000500000004000000000073ca4cdedc334fcf4bca50be0000040000000b000000f90000000000615f00dca619751586fddcac5dc04f420394e49fe8a590d13216bd9f891d1f1fbab27905fb1c4f315a25c3d17a06ad"], 0x0, 0x59, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x145244, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3ed, 0x5, 0xfffffe01, 0x7, 0x0, 0x8, 0x8000}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x42}, 0x800}}, 0xfff, 0x7}, 0x90) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x5) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) 00:12:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000001e0000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000050000000200000006000006040000000e00000006000000050000000800000000000000020000000500000004000000000073ca4cdedc334fcf4bca50be0000040000000b000000f90000000000615f00dca619751586fddcac5dc04f420394e49fe8a590d13216bd9f891d1f1fbab27905fb1c4f315a25c3d17a06ad"], 0x0, 0x59, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x145244, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3ed, 0x5, 0xfffffe01, 0x7, 0x0, 0x8, 0x8000}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x42}, 0x800}}, 0xfff, 0x7}, 0x90) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000050000000200000006000006040000000e00000006000000050000000800000000000000020000000500000004000000000073ca4cdedc334fcf4bca50be0000040000000b000000f90000000000615f00dca619751586fddcac5dc04f420394e49fe8a590d13216bd9f891d1f1fbab27905fb1c4f315a25c3d17a06ad"], 0x0, 0x59, 0x0, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x145244, 0x0) (async) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3ed, 0x5, 0xfffffe01, 0x7, 0x0, 0x8, 0x8000}, 0x1c) (async) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x42}, 0x800}}, 0xfff, 0x7}, 0x90) (async) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x5) (async) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000050000000200000006000006040000000e00000006000000050000000800000000000000020000000500000004000000000073ca4cdedc334fcf4bca50be0000040000000b000000f90000000000615f00dca619751586fddcac5dc04f420394e49fe8a590d13216bd9f891d1f1fbab27905fb1c4f315a25c3d17a06ad"], 0x0, 0x59, 0x0, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000050000000200000006000006040000000e00000006000000050000000800000000000000020000000500000004000000000073ca4cdedc334fcf4bca50be0000040000000b000000f90000000000615f00dca619751586fddcac5dc04f420394e49fe8a590d13216bd9f891d1f1fbab27905fb1c4f315a25c3d17a06ad"], 0x0, 0x59, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x145244, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3ed, 0x5, 0xfffffe01, 0x7, 0x0, 0x8, 0x8000}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x42}, 0x800}}, 0xfff, 0x7}, 0x90) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x5) (async) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x5) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 00:12:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000001e0000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@int]}, {0x0, [0x61]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:58 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x18, 0x5, 0x9, 0xa7, 0x4, 0xfff, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x81, @mcast2, 0xc4}}, 0x10001, 0x7ffd, 0x2, 0x5, 0x200}}, &(0x7f0000000000)=0xb0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:58 executing program 0: getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="00000000180000000000e8000c0000100c0000000500000002000000000000060400000000005f3000"], 0x0, 0x29, 0x27, 0x1}, 0x20) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a, 0x0, 0x1}, 0x20) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:58 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x18, 0x5, 0x9, 0xa7, 0x4, 0xfff, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x81, @mcast2, 0xc4}}, 0x10001, 0x7ffd, 0x2, 0x5, 0x200}}, &(0x7f0000000000)=0xb0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x18, 0x5, 0x9, 0xa7, 0x4, 0xfff, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x81, @mcast2, 0xc4}}, 0x10001, 0x7ffd, 0x2, 0x5, 0x200}}, &(0x7f0000000000)=0xb0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:12:58 executing program 0: getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="00000000180000000000e8000c0000100c0000000500000002000000000000060400000000005f3000"], 0x0, 0x29, 0x27, 0x1}, 0x20) (async, rerun: 32) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:12:58 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x18, 0x5, 0x9, 0xa7, 0x4, 0xfff, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x81, @mcast2, 0xc4}}, 0x10001, 0x7ffd, 0x2, 0x5, 0x200}}, &(0x7f0000000000)=0xb0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) 00:12:58 executing program 0: getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="00000000180000000000e8000c0000100c0000000500000002000000000000060400000000005f3000"], 0x0, 0x29, 0x27, 0x1}, 0x20) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:12:58 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, 0x0, 0x2a}, 0x20) 00:12:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:58 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9fdb65a6467a9c54db0a00040c000300000000000000ffe402000000000000060400000000005f5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7be, '\x00', 0x0, r0, 0x2, 0x2, 0x2}, 0x48) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x7fff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) read$char_usb(r3, &(0x7f0000000200)=""/37, 0x25) 00:12:58 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) (async) 00:12:58 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9fdb65a6467a9c54db0a00040c000300000000000000ffe402000000000000060400000000005f5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7be, '\x00', 0x0, r0, 0x2, 0x2, 0x2}, 0x48) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x7fff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) (async) read$char_usb(r3, &(0x7f0000000200)=""/37, 0x25) 00:12:58 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28}, 0x20) 00:12:58 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:58 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9fdb65a6467a9c54db0a00040c000300000000000000ffe402000000000000060400000000005f5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7be, '\x00', 0x0, r0, 0x2, 0x2, 0x2}, 0x48) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x7fff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) read$char_usb(r3, &(0x7f0000000200)=""/37, 0x25) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9fdb65a6467a9c54db0a00040c000300000000000000ffe402000000000000060400000000005f5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7be, '\x00', 0x0, r0, 0x2, 0x2, 0x2}, 0x48) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x20, 0x0, r1, 0x7fff, '\x00', r2, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) (async) read$char_usb(r3, &(0x7f0000000200)=""/37, 0x25) (async) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) (async) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1}}, 0x18) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0xff, 0x6, @broadcast}, 0x14) 00:12:59 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:59 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020}, 0x2020) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0xff, 0x6, @broadcast}, 0x14) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7, 0x2, 0x0, 0x4, 0x1, 0x9, [{0xd, 0x1, 0x8}, {0x7, 0x2, 0xac}]}, @ptr={0x9}, @func={0x5, 0x0, 0x0, 0xc, 0x5}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x61, 0x0, 0x48, 0x6}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000000)=""/43, 0x69, 0x2b, 0x1, 0x38e}, 0x20) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0xff, 0x6, @broadcast}, 0x14) 00:12:59 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x9}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 00:12:59 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7, 0x2, 0x0, 0x4, 0x1, 0x9, [{0xd, 0x1, 0x8}, {0x7, 0x2, 0xac}]}, @ptr={0x9}, @func={0x5, 0x0, 0x0, 0xc, 0x5}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x61, 0x0, 0x48, 0x6}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000000)=""/43, 0x69, 0x2b, 0x1, 0x38e}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7, 0x2, 0x0, 0x4, 0x1, 0x9, [{0xd, 0x1, 0x8}, {0x7, 0x2, 0xac}]}, @ptr={0x9}, @func={0x5, 0x0, 0x0, 0xc, 0x5}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x61, 0x0, 0x48, 0x6}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000000)=""/43, 0x69, 0x2b, 0x1, 0x38e}, 0x20) (async) 00:12:59 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0xc, 0xfffffffc, 0x80000080}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x9}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e8739f11c080000000000000000000002bf70ca890000000200000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@struct={0x7, 0x2, 0x0, 0x4, 0x1, 0x9, [{0xd, 0x1, 0x8}, {0x7, 0x2, 0xac}]}, @ptr={0x9}, @func={0x5, 0x0, 0x0, 0xc, 0x5}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x61, 0x0, 0x48, 0x6}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000000)=""/43, 0x69, 0x2b, 0x1, 0x38e}, 0x20) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x9}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1, 0x9}, 0x20) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000010000000000c0000000c0000000500000802000000000000060400000000005f5f00e72a77d91862000620b6da7e90135f5978c292dc90ca778bd4c6f1ce332ca73790c314ea85d242ffd732978bf55e120c06d7d4979e66a9f4e75113936de98f01f551068945c65c1889c5d960511e732fec111ef37275e1564223f0284c3994a1b8ea2cdc15dcb52cf88bd12ebfeae20df350f73b83a5cc30dfb41862691a63949b570db7f7d8ee5bd07eeff7361149be508d5c0e21b24a6d849043542a0693f9edadb8467f6a8be61a56807d79fd000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:12:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000010000000000c0000000c0000000500000802000000000000060400000000005f5f00e72a77d91862000620b6da7e90135f5978c292dc90ca778bd4c6f1ce332ca73790c314ea85d242ffd732978bf55e120c06d7d4979e66a9f4e75113936de98f01f551068945c65c1889c5d960511e732fec111ef37275e1564223f0284c3994a1b8ea2cdc15dcb52cf88bd12ebfeae20df350f73b83a5cc30dfb41862691a63949b570db7f7d8ee5bd07eeff7361149be508d5c0e21b24a6d849043542a0693f9edadb8467f6a8be61a56807d79fd000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:59 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x0, 0x28, 0x0, 0x1, 0xffffffff}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000040)={&(0x7f0000000400)=""/266, 0x10a, 0x0, &(0x7f0000000540)=""/213, 0xd5}}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x5, 0x71}, &(0x7f0000000200)=0xc) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, &(0x7f0000000000)) 00:12:59 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r4, {0x0, 0x2}}, 0x20) r5 = getuid() read$FUSE(r2, &(0x7f0000000540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r2, &(0x7f0000002580)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f00000045c0)={0x3e8, 0x0, r4, [{{0x4, 0x3, 0xb2c3, 0xffffffff, 0x7, 0x8d7, {0x6, 0x969, 0xfd3, 0x80000001, 0x101, 0x4, 0x9b6, 0x9, 0x8001, 0x6000, 0x3, 0x0, 0x0, 0xfffffff8, 0x80}}, {0x4, 0x2, 0xb, 0x3, '/dev/hwrng\x00'}}, {{0x3, 0x1, 0x9, 0x2, 0x80, 0x0, {0x4, 0x0, 0x0, 0xa90, 0x8, 0x101, 0xc25, 0x9cf5, 0x9, 0xc000, 0x8, r5, 0xee00, 0x5, 0x8}}, {0x3, 0x37d75601, 0x0, 0x1c0000}}, {{0x0, 0x200000000, 0x3, 0x3, 0x5, 0x1000, {0x1, 0x1000, 0x101, 0x9, 0x3f, 0x4, 0xcc5, 0x0, 0xffffffc1, 0x1000, 0x1ff, 0xffffffffffffffff, r6, 0x6, 0x7}}, {0x3, 0x9, 0xa, 0x200, 'syzkaller\x00'}}, {{0x5, 0x2, 0xff, 0x1, 0x9, 0x20, {0x6, 0xffffffffffffff7c, 0x0, 0x7, 0xfff, 0x3, 0x1, 0x6, 0x101, 0x4000, 0x8, 0xee00, 0xee01, 0xff, 0xffffffe1}}, {0x1, 0x8, 0xa, 0x4, 'syzkaller\x00'}}, {{0x6, 0x1, 0x5, 0x80000001, 0x6, 0x0, {0x0, 0x2, 0xfffffffffffff2fa, 0xffffffff, 0x7088, 0x97, 0x1, 0x1, 0x7fffffff, 0x1000, 0x80000000, 0xffffffffffffffff, r7, 0x9c2, 0x8}}, {0x5, 0xba4, 0x6, 0x8, '-}\xcec//'}}, {{0x1, 0x3, 0x0, 0xa6, 0x2, 0x7fff, {0x2, 0x200, 0x101, 0x17ca, 0x100, 0x58, 0x1, 0x8, 0x4, 0x1000, 0x0, 0xffffffffffffffff, 0x0, 0x400, 0x2}}, {0x6, 0x7, 0xb, 0x0, '/dev/hwrng\x00'}}]}, 0x3e8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x1e, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x3, 0x0, 0x0, 0x7, 0x3, 0x1, 0x10}, @alu={0x7, 0x0, 0xa, 0x5, 0x9, 0x30, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0xff, 0x7, 0x6, 0x5, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xdeb, 0xe7, &(0x7f00000002c0)=""/231, 0x40f00, 0x63, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x5, 0x4, 0x7ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x5, 0x5, 0x10, 0x4}], 0x10, 0x8d}, 0x90) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:12:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000010000000000c0000000c0000000500000802000000000000060400000000005f5f00e72a77d91862000620b6da7e90135f5978c292dc90ca778bd4c6f1ce332ca73790c314ea85d242ffd732978bf55e120c06d7d4979e66a9f4e75113936de98f01f551068945c65c1889c5d960511e732fec111ef37275e1564223f0284c3994a1b8ea2cdc15dcb52cf88bd12ebfeae20df350f73b83a5cc30dfb41862691a63949b570db7f7d8ee5bd07eeff7361149be508d5c0e21b24a6d849043542a0693f9edadb8467f6a8be61a56807d79fd000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:12:59 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x0, 0x28, 0x0, 0x1, 0xffffffff}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000040)={&(0x7f0000000400)=""/266, 0x10a, 0x0, &(0x7f0000000540)=""/213, 0xd5}}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x5, 0x71}, &(0x7f0000000200)=0xc) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x0, 0x28, 0x0, 0x1, 0xffffffff}, 0x20) (async) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000040)={&(0x7f0000000400)=""/266, 0x10a, 0x0, &(0x7f0000000540)=""/213, 0xd5}}, 0x10) (async) socket$inet6_sctp(0xa, 0x1, 0x84) (async) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) (async) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x5, 0x71}, &(0x7f0000000200)=0xc) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) accept$netrom(r2, 0x0, &(0x7f0000000000)) (async) 00:12:59 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, r0, 0x5, 0x5, 0x1}, 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x4, '\x00', 0x0, r0, 0x5, 0x3, 0x3}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x5f, 0x0, 0x401, 0x1, @private2, @mcast2, 0x8000, 0x8, 0x80000001}}) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r7, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x81}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r4}, @generic={0x3, 0x5, 0x2, 0xfffb, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x7ff, 0x84, &(0x7f0000000300)=""/132, 0x41000, 0x0, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000480)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xa, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r6, r7], 0x0, 0x10, 0x4}, 0x90) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r8, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x7ff, 0x0, 0x3ff, 0x20, r1, 0x4, '\x00', r2, r8, 0x4, 0x0, 0x2}, 0x5b) 00:12:59 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x0, 0x28, 0x0, 0x1, 0xffffffff}, 0x20) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000040)={&(0x7f0000000400)=""/266, 0x10a, 0x0, &(0x7f0000000540)=""/213, 0xd5}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000040)={&(0x7f0000000400)=""/266, 0x10a, 0x0, &(0x7f0000000540)=""/213, 0xd5}}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) (async) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x5, 0x71}, &(0x7f0000000200)=0xc) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept$netrom(r2, 0x0, &(0x7f0000000000)) 00:12:59 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r4, {0x0, 0x2}}, 0x20) r5 = getuid() read$FUSE(r2, &(0x7f0000000540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r2, &(0x7f0000002580)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f00000045c0)={0x3e8, 0x0, r4, [{{0x4, 0x3, 0xb2c3, 0xffffffff, 0x7, 0x8d7, {0x6, 0x969, 0xfd3, 0x80000001, 0x101, 0x4, 0x9b6, 0x9, 0x8001, 0x6000, 0x3, 0x0, 0x0, 0xfffffff8, 0x80}}, {0x4, 0x2, 0xb, 0x3, '/dev/hwrng\x00'}}, {{0x3, 0x1, 0x9, 0x2, 0x80, 0x0, {0x4, 0x0, 0x0, 0xa90, 0x8, 0x101, 0xc25, 0x9cf5, 0x9, 0xc000, 0x8, r5, 0xee00, 0x5, 0x8}}, {0x3, 0x37d75601, 0x0, 0x1c0000}}, {{0x0, 0x200000000, 0x3, 0x3, 0x5, 0x1000, {0x1, 0x1000, 0x101, 0x9, 0x3f, 0x4, 0xcc5, 0x0, 0xffffffc1, 0x1000, 0x1ff, 0xffffffffffffffff, r6, 0x6, 0x7}}, {0x3, 0x9, 0xa, 0x200, 'syzkaller\x00'}}, {{0x5, 0x2, 0xff, 0x1, 0x9, 0x20, {0x6, 0xffffffffffffff7c, 0x0, 0x7, 0xfff, 0x3, 0x1, 0x6, 0x101, 0x4000, 0x8, 0xee00, 0xee01, 0xff, 0xffffffe1}}, {0x1, 0x8, 0xa, 0x4, 'syzkaller\x00'}}, {{0x6, 0x1, 0x5, 0x80000001, 0x6, 0x0, {0x0, 0x2, 0xfffffffffffff2fa, 0xffffffff, 0x7088, 0x97, 0x1, 0x1, 0x7fffffff, 0x1000, 0x80000000, 0xffffffffffffffff, r7, 0x9c2, 0x8}}, {0x5, 0xba4, 0x6, 0x8, '-}\xcec//'}}, {{0x1, 0x3, 0x0, 0xa6, 0x2, 0x7fff, {0x2, 0x200, 0x101, 0x17ca, 0x100, 0x58, 0x1, 0x8, 0x4, 0x1000, 0x0, 0xffffffffffffffff, 0x0, 0x400, 0x2}}, {0x6, 0x7, 0xb, 0x0, '/dev/hwrng\x00'}}]}, 0x3e8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x1e, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x3, 0x0, 0x0, 0x7, 0x3, 0x1, 0x10}, @alu={0x7, 0x0, 0xa, 0x5, 0x9, 0x30, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0xff, 0x7, 0x6, 0x5, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xdeb, 0xe7, &(0x7f00000002c0)=""/231, 0x40f00, 0x63, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x5, 0x4, 0x7ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x5, 0x5, 0x10, 0x4}], 0x10, 0x8d}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x48) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020}, 0x2020) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r4, {0x0, 0x2}}, 0x20) (async) getuid() (async) read$FUSE(r2, &(0x7f0000000540)={0x2020}, 0x2020) (async) read$FUSE(r2, &(0x7f0000002580)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r3, &(0x7f00000045c0)={0x3e8, 0x0, r4, [{{0x4, 0x3, 0xb2c3, 0xffffffff, 0x7, 0x8d7, {0x6, 0x969, 0xfd3, 0x80000001, 0x101, 0x4, 0x9b6, 0x9, 0x8001, 0x6000, 0x3, 0x0, 0x0, 0xfffffff8, 0x80}}, {0x4, 0x2, 0xb, 0x3, '/dev/hwrng\x00'}}, {{0x3, 0x1, 0x9, 0x2, 0x80, 0x0, {0x4, 0x0, 0x0, 0xa90, 0x8, 0x101, 0xc25, 0x9cf5, 0x9, 0xc000, 0x8, r5, 0xee00, 0x5, 0x8}}, {0x3, 0x37d75601, 0x0, 0x1c0000}}, {{0x0, 0x200000000, 0x3, 0x3, 0x5, 0x1000, {0x1, 0x1000, 0x101, 0x9, 0x3f, 0x4, 0xcc5, 0x0, 0xffffffc1, 0x1000, 0x1ff, 0xffffffffffffffff, r6, 0x6, 0x7}}, {0x3, 0x9, 0xa, 0x200, 'syzkaller\x00'}}, {{0x5, 0x2, 0xff, 0x1, 0x9, 0x20, {0x6, 0xffffffffffffff7c, 0x0, 0x7, 0xfff, 0x3, 0x1, 0x6, 0x101, 0x4000, 0x8, 0xee00, 0xee01, 0xff, 0xffffffe1}}, {0x1, 0x8, 0xa, 0x4, 'syzkaller\x00'}}, {{0x6, 0x1, 0x5, 0x80000001, 0x6, 0x0, {0x0, 0x2, 0xfffffffffffff2fa, 0xffffffff, 0x7088, 0x97, 0x1, 0x1, 0x7fffffff, 0x1000, 0x80000000, 0xffffffffffffffff, r7, 0x9c2, 0x8}}, {0x5, 0xba4, 0x6, 0x8, '-}\xcec//'}}, {{0x1, 0x3, 0x0, 0xa6, 0x2, 0x7fff, {0x2, 0x200, 0x101, 0x17ca, 0x100, 0x58, 0x1, 0x8, 0x4, 0x1000, 0x0, 0xffffffffffffffff, 0x0, 0x400, 0x2}}, {0x6, 0x7, 0xb, 0x0, '/dev/hwrng\x00'}}]}, 0x3e8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x1e, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x3, 0x0, 0x0, 0x7, 0x3, 0x1, 0x10}, @alu={0x7, 0x0, 0xa, 0x5, 0x9, 0x30, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0xff, 0x7, 0x6, 0x5, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xdeb, 0xe7, &(0x7f00000002c0)=""/231, 0x40f00, 0x63, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x5, 0x4, 0x7ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x5, 0x5, 0x10, 0x4}], 0x10, 0x8d}, 0x90) (async) 00:12:59 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, r0, 0x5, 0x5, 0x1}, 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x4) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x4, '\x00', 0x0, r0, 0x5, 0x3, 0x3}, 0x48) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x5f, 0x0, 0x401, 0x1, @private2, @mcast2, 0x8000, 0x8, 0x80000001}}) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r7, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x81}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r4}, @generic={0x3, 0x5, 0x2, 0xfffb, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x7ff, 0x84, &(0x7f0000000300)=""/132, 0x41000, 0x0, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000480)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xa, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r6, r7], 0x0, 0x10, 0x4}, 0x90) (async) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r8, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x7ff, 0x0, 0x3ff, 0x20, r1, 0x4, '\x00', r2, r8, 0x4, 0x0, 0x2}, 0x5b) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000)=0xd5c, 0x4) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, r0, 0x5, 0x5, 0x1}, 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x4, '\x00', 0x0, r0, 0x5, 0x3, 0x3}, 0x48) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x5f, 0x0, 0x401, 0x1, @private2, @mcast2, 0x8000, 0x8, 0x80000001}}) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r7, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x81}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r4}, @generic={0x3, 0x5, 0x2, 0xfffb, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x7ff, 0x84, &(0x7f0000000300)=""/132, 0x41000, 0x0, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000480)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xa, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r6, r7], 0x0, 0x10, 0x4}, 0x90) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r8, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x7ff, 0x0, 0x3ff, 0x20, r1, 0x4, '\x00', r2, r8, 0x4, 0x0, 0x2}, 0x5b) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, r0, 0x5, 0x5, 0x1}, 0x48) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f00000001c0)=0x4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x4, '\x00', 0x0, r0, 0x5, 0x3, 0x3}, 0x48) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x5f, 0x0, 0x401, 0x1, @private2, @mcast2, 0x8000, 0x8, 0x80000001}}) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r7, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x81}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r4}, @generic={0x3, 0x5, 0x2, 0xfffb, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000200)='GPL\x00', 0x7ff, 0x84, &(0x7f0000000300)=""/132, 0x41000, 0x0, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000480)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xa, 0x7, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r6, r7], 0x0, 0x10, 0x4}, 0x90) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r8, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x7ff, 0x0, 0x3ff, 0x20, r1, 0x4, '\x00', r2, r8, 0x4, 0x0, 0x2}, 0x5b) (async) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000200)={0x20, 0x0, r0, {0xc6, 0x0, 0x6, 0x1}}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r0, {0x7, 0x27, 0x6, 0x102000, 0x2a, 0x3, 0x0, 0x7ff}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f5f00afb982d1ae5264313328194d4cbb9f6a7441e599362aa9e2fbb88bb2eaa8e7e4d6397f5c8af7a27603f0877899cac0dbcec8a68ae82fce4c22521564dd45abbf6ebcf26f81d4a6a6def3917f8c0553c4b4b6abae16f8ffffffffffff292f6dee0bc4726c8f8495b321d13a5fec4d3b43e7883f5b918576d7d50362c37400bdf1f9c902d50f0000b60f8909b13884158276606d75808736e1f878d71388ad8d4740fe93b6edd6be1d254612a9bfee301a8d861008b61b17761169b34a36af39abdb424e12"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$RFKILL_IOC_MAX_SIZE(0xffffffffffffffff, 0x2, &(0x7f0000000040)=0x99f) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x0, 0x4}, 0x48) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x3, 0x9, 0xc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, 0x80, 0x8000, 0x30ee, 0x3}}) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000)=0xd5c, 0x4) (async) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000)=0xd5c, 0x4) 00:12:59 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x48) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r4, {0x0, 0x2}}, 0x20) (async) r5 = getuid() (async) read$FUSE(r2, &(0x7f0000000540)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r2, &(0x7f0000002580)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f00000045c0)={0x3e8, 0x0, r4, [{{0x4, 0x3, 0xb2c3, 0xffffffff, 0x7, 0x8d7, {0x6, 0x969, 0xfd3, 0x80000001, 0x101, 0x4, 0x9b6, 0x9, 0x8001, 0x6000, 0x3, 0x0, 0x0, 0xfffffff8, 0x80}}, {0x4, 0x2, 0xb, 0x3, '/dev/hwrng\x00'}}, {{0x3, 0x1, 0x9, 0x2, 0x80, 0x0, {0x4, 0x0, 0x0, 0xa90, 0x8, 0x101, 0xc25, 0x9cf5, 0x9, 0xc000, 0x8, r5, 0xee00, 0x5, 0x8}}, {0x3, 0x37d75601, 0x0, 0x1c0000}}, {{0x0, 0x200000000, 0x3, 0x3, 0x5, 0x1000, {0x1, 0x1000, 0x101, 0x9, 0x3f, 0x4, 0xcc5, 0x0, 0xffffffc1, 0x1000, 0x1ff, 0xffffffffffffffff, r6, 0x6, 0x7}}, {0x3, 0x9, 0xa, 0x200, 'syzkaller\x00'}}, {{0x5, 0x2, 0xff, 0x1, 0x9, 0x20, {0x6, 0xffffffffffffff7c, 0x0, 0x7, 0xfff, 0x3, 0x1, 0x6, 0x101, 0x4000, 0x8, 0xee00, 0xee01, 0xff, 0xffffffe1}}, {0x1, 0x8, 0xa, 0x4, 'syzkaller\x00'}}, {{0x6, 0x1, 0x5, 0x80000001, 0x6, 0x0, {0x0, 0x2, 0xfffffffffffff2fa, 0xffffffff, 0x7088, 0x97, 0x1, 0x1, 0x7fffffff, 0x1000, 0x80000000, 0xffffffffffffffff, r7, 0x9c2, 0x8}}, {0x5, 0xba4, 0x6, 0x8, '-}\xcec//'}}, {{0x1, 0x3, 0x0, 0xa6, 0x2, 0x7fff, {0x2, 0x200, 0x101, 0x17ca, 0x100, 0x58, 0x1, 0x8, 0x4, 0x1000, 0x0, 0xffffffffffffffff, 0x0, 0x400, 0x2}}, {0x6, 0x7, 0xb, 0x0, '/dev/hwrng\x00'}}]}, 0x3e8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x1e, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @ldst={0x3, 0x0, 0x0, 0x7, 0x3, 0x1, 0x10}, @alu={0x7, 0x0, 0xa, 0x5, 0x9, 0x30, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0xff, 0x7, 0x6, 0x5, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xdeb, 0xe7, &(0x7f00000002c0)=""/231, 0x40f00, 0x63, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x5, 0x4, 0x7ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0xffffffffffffffff], &(0x7f0000000440)=[{0x5, 0x5, 0x10, 0x4}], 0x10, 0x8d}, 0x90) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000)=0xd5c, 0x4) 00:12:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0xe, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x5f, 0x1e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = syz_io_uring_complete(0x0) write$smackfs_ptrace(r0, &(0x7f00000035c0)=0x1, 0x14) socket$packet(0x11, 0x2, 0x300) r1 = syz_io_uring_complete(0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x8000000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x2000, @fd=r3, 0x0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/245, 0xf5}, {&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000080)=""/37, 0x25}], 0x6, 0x2, 0x1}) read$FUSE(r1, &(0x7f00000014c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r3, &(0x7f0000003500)={0x18, 0x0, r4, {0x3}}, 0x18) r5 = syz_open_dev$vim2m(&(0x7f0000003540), 0xfffffffffffffe00, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f0000003580)={0x3, 0x8, 0xffff, 0x800}) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000054000000540000000500000002000000090000060400000003b7a0f41502000002000000d60d000002000000050000000300000001800000020000003f000000000000009d0a000008000000d40700000f000000d60500000d000000ff0100000000000000"], 0x0, 0x71, 0x0, 0x1}, 0x20) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x800, 0x200, 0x1, r1}}}, 0x28) 00:12:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 00:12:59 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) write$FUSE_POLL(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x7f}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000054000000540000000500000002000000090000060400000003b7a0f41502000002000000d60d000002000000050000000300000001800000020000003f000000000000009d0a000008000000d40700000f000000d60500000d000000ff0100000000000000"], 0x0, 0x71, 0x0, 0x1}, 0x20) 00:12:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000054000000540000000500000002000000090000060400000003b7a0f41502000002000000d60d000002000000050000000300000001800000020000003f000000000000009d0a000008000000d40700000f000000d60500000d000000ff0100000000000000"], 0x0, 0x71, 0x0, 0x1}, 0x20) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0xe, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x5f, 0x1e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = syz_io_uring_complete(0x0) write$smackfs_ptrace(r0, &(0x7f00000035c0)=0x1, 0x14) socket$packet(0x11, 0x2, 0x300) r1 = syz_io_uring_complete(0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x8000000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x2000, @fd=r3, 0x0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/245, 0xf5}, {&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000080)=""/37, 0x25}], 0x6, 0x2, 0x1}) read$FUSE(r1, &(0x7f00000014c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r3, &(0x7f0000003500)={0x18, 0x0, r4, {0x3}}, 0x18) r5 = syz_open_dev$vim2m(&(0x7f0000003540), 0xfffffffffffffe00, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f0000003580)={0x3, 0x8, 0xffff, 0x800}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0xe, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x5f, 0x1e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) syz_io_uring_complete(0x0) (async) write$smackfs_ptrace(r0, &(0x7f00000035c0)=0x1, 0x14) (async) socket$packet(0x11, 0x2, 0x300) (async) syz_io_uring_complete(0x0) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x8000000) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) (async) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x2000, @fd=r3, 0x0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/245, 0xf5}, {&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000080)=""/37, 0x25}], 0x6, 0x2, 0x1}) (async) read$FUSE(r1, &(0x7f00000014c0)={0x2020}, 0x2020) (async) write$FUSE_WRITE(r3, &(0x7f0000003500)={0x18, 0x0, r4, {0x3}}, 0x18) (async) syz_open_dev$vim2m(&(0x7f0000003540), 0xfffffffffffffe00, 0x2) (async) ioctl$vim2m_VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f0000003580)={0x3, 0x8, 0xffff, 0x800}) (async) 00:12:59 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) write$FUSE_POLL(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x7f}}, 0x18) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (rerun: 64) 00:12:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:12:59 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x0, {0xff}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, r1, {0x6}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff95, [@enum={0xc}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x81}, 0x20) 00:12:59 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) (async, rerun: 32) write$FUSE_POLL(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x7f}}, 0x18) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x0, {0xff}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, r1, {0x6}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff95, [@enum={0xc}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x81}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x0, {0xff}}, 0x18) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) (async) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, r1, {0x6}}, 0x18) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff95, [@enum={0xc}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x81}, 0x20) (async) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'b', ' *:* ', 'r\x00'}, 0x8) 00:12:59 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x0, {0xff}}, 0x18) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, r1, {0x6}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xffffffffffffff95, [@enum={0xc}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x81}, 0x20) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'b', ' *:* ', 'r\x00'}, 0x8) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0xe, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x5f, 0x1e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = syz_io_uring_complete(0x0) write$smackfs_ptrace(r0, &(0x7f00000035c0)=0x1, 0x14) socket$packet(0x11, 0x2, 0x300) r1 = syz_io_uring_complete(0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x8000000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x2000, @fd=r3, 0x0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/245, 0xf5}, {&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000080)=""/37, 0x25}], 0x6, 0x2, 0x1}) read$FUSE(r1, &(0x7f00000014c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r3, &(0x7f0000003500)={0x18, 0x0, r4, {0x3}}, 0x18) r5 = syz_open_dev$vim2m(&(0x7f0000003540), 0xfffffffffffffe00, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f0000003580)={0x3, 0x8, 0xffff, 0x800}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0xe, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x61, 0x5f, 0x1e]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) syz_io_uring_complete(0x0) (async) write$smackfs_ptrace(r0, &(0x7f00000035c0)=0x1, 0x14) (async) socket$packet(0x11, 0x2, 0x300) (async) syz_io_uring_complete(0x0) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x8000000) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) (async) syz_io_uring_submit(r2, 0x0, &(0x7f00000000c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x2000, @fd=r3, 0x0, &(0x7f0000001440)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/245, 0xf5}, {&(0x7f0000000000)=""/2, 0x2}, {&(0x7f0000000080)=""/37, 0x25}], 0x6, 0x2, 0x1}) (async) read$FUSE(r1, &(0x7f00000014c0)={0x2020}, 0x2020) (async) write$FUSE_WRITE(r3, &(0x7f0000003500)={0x18, 0x0, r4, {0x3}}, 0x18) (async) syz_open_dev$vim2m(&(0x7f0000003540), 0xfffffffffffffe00, 0x2) (async) ioctl$vim2m_VIDIOC_EXPBUF(r5, 0xc0405610, &(0x7f0000003580)={0x3, 0x8, 0xffff, 0x800}) (async) 00:12:59 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:12:59 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c211a7e"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="60fc000006000000001a000d000000000000"], &(0x7f0000000080)=0x16) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x7d, 0x1f}, &(0x7f0000000140)=0xfffffffffffffd28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0x4, [@const={0xb, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x28, 0x0, 0x1, 0x1ff}, 0x20) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={r1, 0x60, 0x0, 0xadc, 0xe31}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r2, 0xb4, 0x6}, &(0x7f0000000280)=0x8) 00:12:59 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:12:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'b', ' *:* ', 'r\x00'}, 0x8) 00:12:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:12:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x30, 0x30, 0x0, 0x61, 0x0, 0x30, 0x5f, 0x61]}}, &(0x7f00000000c0)=""/27, 0x3e, 0x1b, 0x1}, 0x20) 00:13:00 executing program 0: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@netrom, @default, @remote, @bcast, @netrom, @bcast, @bcast, @netrom]}, &(0x7f0000000000)=0x48, 0x80000) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x8, {}, 0x8, 0xf, 0x1, {0x0, 0x0, r1}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 0: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@netrom, @default, @remote, @bcast, @netrom, @bcast, @bcast, @netrom]}, &(0x7f0000000000)=0x48, 0x80000) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x8, {}, 0x8, 0xf, 0x1, {0x0, 0x0, r1}}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x30, 0x30, 0x0, 0x61, 0x0, 0x30, 0x5f, 0x61]}}, &(0x7f00000000c0)=""/27, 0x3e, 0x1b, 0x1}, 0x20) 00:13:00 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="60fc000006000000001a000d000000000000"], &(0x7f0000000080)=0x16) socket$inet_sctp(0x2, 0x1, 0x84) (async) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x7d, 0x1f}, &(0x7f0000000140)=0xfffffffffffffd28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0x4, [@const={0xb, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x28, 0x0, 0x1, 0x1ff}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0x4, [@const={0xb, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x28, 0x0, 0x1, 0x1ff}, 0x20) socket$packet(0x11, 0x3, 0x300) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={r1, 0x60, 0x0, 0xadc, 0xe31}, &(0x7f00000001c0)=0x18) (async) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={r1, 0x60, 0x0, 0xadc, 0xe31}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r2, 0xb4, 0x6}, &(0x7f0000000280)=0x8) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x7ff, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x30, 0x30, 0x0, 0x61, 0x0, 0x30, 0x5f, 0x61]}}, &(0x7f00000000c0)=""/27, 0x3e, 0x1b, 0x1}, 0x20) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 0: accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@netrom, @default, @remote, @bcast, @netrom, @bcast, @bcast, @netrom]}, &(0x7f0000000000)=0x48, 0x80000) (async) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@netrom, @default, @remote, @bcast, @netrom, @bcast, @bcast, @netrom]}, &(0x7f0000000000)=0x48, 0x80000) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x8, {}, 0x8, 0xf, 0x1, {0x0, 0x0, r1}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x3, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 5: syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x1) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x80000001) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0xfdd, '\x00', 0x0, r2, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="60fc000006000000001a000d000000000000"], &(0x7f0000000080)=0x16) (async) socket$inet_sctp(0x2, 0x1, 0x84) (async) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x7d, 0x1f}, &(0x7f0000000140)=0xfffffffffffffd28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0xc, 0x4, [@const={0xb, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x28, 0x0, 0x1, 0x1ff}, 0x20) (async) socket$packet(0x11, 0x3, 0x300) (async) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={r1, 0x60, 0x0, 0xadc, 0xe31}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r2, 0xb4, 0x6}, &(0x7f0000000280)=0x8) 00:13:00 executing program 0: r0 = syz_io_uring_complete(0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000080)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x1) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x80000001) (async) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async, rerun: 32) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0xfdd, '\x00', 0x0, r2, 0x4, 0x0, 0x2}, 0x48) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x104, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 0: r0 = syz_io_uring_complete(0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000080)=0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002000000000000060400020000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 0: r0 = syz_io_uring_complete(0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000080)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x1) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x80000001) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) (async) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0xfdd, '\x00', 0x0, r2, 0x4, 0x0, 0x2}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0xfdd, '\x00', 0x0, r2, 0x4, 0x0, 0x2}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002000000000000060400020000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002000000000000060400020000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:13:00 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/219, 0xdb, 0x0, &(0x7f0000000240)=""/135, 0x87}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002000000000000060400020000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002000000000000060400020000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:13:00 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="19febb6b9703b52895256bc9a3e0ef4780b51900c7ffff273ec2cdde"], &(0x7f0000000080)=""/39, 0x1c, 0x27, 0x1, 0x2}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, r0, 0x3, 0x2, 0x4}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x7, '\x00', 0x0, r2, 0x5, 0x3, 0x4}, 0x48) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6}, 0x10) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) accept4$netrom(r4, &(0x7f0000000280)={{0x3, @netrom}, [@default, @rose, @null, @bcast, @netrom, @default, @bcast, @rose]}, &(0x7f0000000300)=0x48, 0x80000) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 5: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/219, 0xdb, 0x0, &(0x7f0000000240)=""/135, 0x87}}, 0x10) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (rerun: 64) 00:13:00 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) r1 = geteuid() read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002180)={0xa8, 0xfffffffffffffff5, r0, [{{0x2, 0x2, 0x1, 0x1, 0x8, 0x80, {0x0, 0x3, 0x0, 0xffffffffffffffff, 0x2, 0x8, 0x7, 0x7, 0x2, 0xa000, 0x1fc0, r1, r2, 0x8, 0x1ff}}, {0x2, 0x2, 0x0, 0x10000}}]}, 0xa8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x5f]}}, 0x0, 0x1c, 0x0, 0x1, 0x2000}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x104, 0x0, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb8cf85c"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 5: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) (async) r1 = geteuid() (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002180)={0xa8, 0xfffffffffffffff5, r0, [{{0x2, 0x2, 0x1, 0x1, 0x8, 0x80, {0x0, 0x3, 0x0, 0xffffffffffffffff, 0x2, 0x8, 0x7, 0x7, 0x2, 0xa000, 0x1fc0, r1, r2, 0x8, 0x1ff}}, {0x2, 0x2, 0x0, 0x10000}}]}, 0xa8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x5f]}}, 0x0, 0x1c, 0x0, 0x1, 0x2000}, 0x20) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x104, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x104, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r0, {0x0, 0x2}}, 0x20) r1 = geteuid() (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002180)={0xa8, 0xfffffffffffffff5, r0, [{{0x2, 0x2, 0x1, 0x1, 0x8, 0x80, {0x0, 0x3, 0x0, 0xffffffffffffffff, 0x2, 0x8, 0x7, 0x7, 0x2, 0xa000, 0x1fc0, r1, r2, 0x8, 0x1ff}}, {0x2, 0x2, 0x0, 0x10000}}]}, 0xa8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x5f]}}, 0x0, 0x1c, 0x0, 0x1, 0x2000}, 0x20) 00:13:00 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/219, 0xdb, 0x0, &(0x7f0000000240)=""/135, 0x87}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="19febb6b9703b52895256bc9a3e0ef4780b51900c7ffff273ec2cdde"], &(0x7f0000000080)=""/39, 0x1c, 0x27, 0x1, 0x2}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, r0, 0x3, 0x2, 0x4}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x7, '\x00', 0x0, r2, 0x5, 0x3, 0x4}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x7, '\x00', 0x0, r2, 0x5, 0x3, 0x4}, 0x48) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6}, 0x10) (async) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6}, 0x10) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) accept4$netrom(r4, &(0x7f0000000280)={{0x3, @netrom}, [@default, @rose, @null, @bcast, @netrom, @default, @bcast, @rose]}, &(0x7f0000000300)=0x48, 0x80000) (async) accept4$netrom(r4, &(0x7f0000000280)={{0x3, @netrom}, [@default, @rose, @null, @bcast, @netrom, @default, @bcast, @rose]}, &(0x7f0000000300)=0x48, 0x80000) 00:13:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x104}, 0x48) 00:13:00 executing program 5: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000f0000608300000000060400000000005f5f"], 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03e"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x28, 0x0, 0x1}, 0x20) prctl$PR_GET_IO_FLUSHER(0x3a) 00:13:00 executing program 1: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000f0000608300000000060400000000005f5f"], 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 5: syz_clone(0x4300, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) prctl$PR_GET_IO_FLUSHER(0x3a) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03e"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="19febb6b9703b52895256bc9a3e0ef4780b51900c7ffff273ec2cdde"], &(0x7f0000000080)=""/39, 0x1c, 0x27, 0x1, 0x2}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, r0, 0x3, 0x2, 0x4}, 0x48) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x7, '\x00', 0x0, r2, 0x5, 0x3, 0x4}, 0x48) (async) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6}, 0x10) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) accept4$netrom(r4, &(0x7f0000000280)={{0x3, @netrom}, [@default, @rose, @null, @bcast, @netrom, @default, @bcast, @rose]}, &(0x7f0000000300)=0x48, 0x80000) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000f0000608300000000060400000000005f5f"], 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) prctl$PR_GET_IO_FLUSHER(0x3a) 00:13:00 executing program 1: syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03e"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0xffffffff}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/18, 0x38, 0x12, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0xffffffff}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/18, 0x38, 0x12, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) (async) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0xffffffff}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/18, 0x38, 0x12, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0xffffffff}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/18, 0x38, 0x12, 0x1}, 0x20) (async) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000273226ad00000c0000000500000002000000000000060400000000005f365f8d932796d051ed69c96cdd5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c00000000000000020000060000000000e0ff5e5f00"/48], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000273226ad00000c0000000500000002000000000000060400000000005f365f8d932796d051ed69c96cdd5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 5: syz_clone(0x4300, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 1: syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000273226ad00000c0000000500000002000000000000060400000000005f365f8d932796d051ed69c96cdd5f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 00:13:00 executing program 2: ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000001800000000538bb08e7d09834e354aee950f85405a80c6541642a61d0000000c0000000c0000000400000002f6ff"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c00000000000000020000060000000000e0ff5e5f00"/48], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c00000000000000020000060000000000e0ff5e5f00"/48], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c00000000000000020000060000000000e0ff5e5f00"/48], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], 0x0, 0x38, 0x0, 0x1}, 0x20) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1, 0x4}, 0x20) [ 780.983596][T32072] block nbd2: shutting down sockets 00:13:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], 0x0, 0x38, 0x0, 0x1}, 0x20) 00:13:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) syz_io_uring_setup(0x3eb0, &(0x7f0000000140)={0x0, 0xdfdf, 0x200, 0x3, 0xee}, &(0x7f0000000000)=0x0, &(0x7f0000000080)) syz_io_uring_complete(r0) 00:13:00 executing program 2: ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000001800000000538bb08e7d09834e354aee950f85405a80c6541642a61d0000000c0000000c0000000400000002f6ff"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000001800000000538bb08e7d09834e354aee950f85405a80c6541642a61d0000000c0000000c0000000400000002f6ff"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) (async) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) 00:13:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1, 0x4}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1, 0x4}, 0x20) (async) 00:13:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], 0x0, 0x38, 0x0, 0x1}, 0x20) 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) syz_io_uring_setup(0x3eb0, &(0x7f0000000140)={0x0, 0xdfdf, 0x200, 0x3, 0xee}, &(0x7f0000000000)=0x0, &(0x7f0000000080)) syz_io_uring_complete(r0) 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1, 0x4}, 0x20) 00:13:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b}, 0x20) 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/244, 0xf4, 0x0, &(0x7f0000000240)=""/142, 0x8e}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) [ 781.091673][T32092] block nbd2: shutting down sockets 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) syz_io_uring_setup(0x3eb0, &(0x7f0000000140)={0x0, 0xdfdf, 0x200, 0x3, 0xee}, &(0x7f0000000000)=0x0, &(0x7f0000000080)) syz_io_uring_complete(r0) 00:13:01 executing program 5: syz_clone(0x4300, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/244, 0xf4, 0x0, &(0x7f0000000240)=""/142, 0x8e}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) 00:13:01 executing program 2: ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000001800000000538bb08e7d09834e354aee950f85405a80c6541642a61d0000000c0000000c0000000400000002f6ff"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_PRINT_DEBUG(r0, 0xab06) 00:13:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b}, 0x20) 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000000)=""/37, 0x38, 0x25, 0x1}, 0x20) 00:13:01 executing program 1: syz_clone(0x4300, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb170018000000000000001c00000093f03ebfd9eb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b}, 0x20) 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/244, 0xf4, 0x0, &(0x7f0000000240)=""/142, 0x8e}}, 0x10) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x18) [ 781.203594][T32118] block nbd2: Device being setup by another task [ 781.206666][T32116] block nbd2: shutting down sockets 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000000)=""/37, 0x38, 0x25, 0x1}, 0x20) 00:13:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400001102000000000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x20800) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x8) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x0, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000a1e7000000000c0000000c000000030000000a0000000000000700000000000000"], &(0x7f0000000200)=""/221, 0x27, 0x9f, 0x0, 0x8001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000100)=""/95, 0x5f, 0x0, &(0x7f0000000300)=""/204, 0xcc}}, 0x10) 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000000)=""/37, 0x38, 0x25, 0x1}, 0x20) 00:13:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400001102000000000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x20800) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x8) 00:13:01 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x0, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000a1e7000000000c0000000c000000030000000a0000000000000700000000000000"], &(0x7f0000000200)=""/221, 0x27, 0x9f, 0x0, 0x8001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000100)=""/95, 0x5f, 0x0, &(0x7f0000000300)=""/204, 0xcc}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x0, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000a1e7000000000c0000000c000000030000000a0000000000000700000000000000"], &(0x7f0000000200)=""/221, 0x27, 0x9f, 0x0, 0x8001}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000100)=""/95, 0x5f, 0x0, &(0x7f0000000300)=""/204, 0xcc}}, 0x10) (async) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 4: r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], &(0x7f00000001c0)=""/42, 0x38, 0x2a, 0x1, 0x800}, 0x20) 00:13:01 executing program 4: r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], &(0x7f00000001c0)=""/42, 0x38, 0x2a, 0x1, 0x800}, 0x20) 00:13:01 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x0, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000a1e7000000000c0000000c000000030000000a0000000000000700000000000000"], &(0x7f0000000200)=""/221, 0x27, 0x9f, 0x0, 0x8001}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000100)=""/95, 0x5f, 0x0, &(0x7f0000000300)=""/204, 0xcc}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x0, 0x5f]}}, 0x0, 0x1d, 0x0, 0x1}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000a1e7000000000c0000000c000000030000000a0000000000000700000000000000"], &(0x7f0000000200)=""/221, 0x27, 0x9f, 0x0, 0x8001}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000100)=""/95, 0x5f, 0x0, &(0x7f0000000300)=""/204, 0xcc}}, 0x10) (async) 00:13:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400001102000000000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x20800) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x8) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 5: syz_clone(0x4300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:13:01 executing program 4: r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], &(0x7f00000001c0)=""/42, 0x38, 0x2a, 0x1, 0x800}, 0x20) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) (async) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], &(0x7f00000001c0)=""/42, 0x38, 0x2a, 0x1, 0x800}, 0x20) (async) 00:13:01 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1f, 0x9, 0x94, 0x2, 0x2, r2, 0x7, '\x00', 0x0, r3, 0x0, 0x4, 0x3}, 0x48) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) write$cgroup_devices(r2, &(0x7f0000000200)={'a', ' *:* ', 'wm\x00'}, 0x9) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x3f) 00:13:01 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002180)=ANY=[@ANYBLOB="b800000000000000", @ANYRES64=r1, @ANYBLOB="00000000000000000300000000000000800f000000000000f10000000000000047050000090000000000000000000000a8000000000000000100008000000000000000000100000005000000000000007c000000000000000001000000000000faffffff0020000003000000", @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0800000006000000000000000000000004060000000500000000000000000000a0a5257b23262d5d295c00000000000000000100"], 0xb8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000040)=ANY=[], &(0x7f0000000000)=""/27, 0x20, 0x1b, 0xfffffffe, 0x1}, 0x20) 00:13:01 executing program 1: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:13:01 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1f, 0x9, 0x94, 0x2, 0x2, r2, 0x7, '\x00', 0x0, r3, 0x0, 0x4, 0x3}, 0x48) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) write$cgroup_devices(r2, &(0x7f0000000200)={'a', ' *:* ', 'wm\x00'}, 0x9) (async) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x3f) 00:13:01 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002180)=ANY=[@ANYBLOB="b800000000000000", @ANYRES64=r1, @ANYBLOB="00000000000000000300000000000000800f000000000000f10000000000000047050000090000000000000000000000a8000000000000000100008000000000000000000100000005000000000000007c000000000000000001000000000000faffffff0020000003000000", @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0800000006000000000000000000000004060000000500000000000000000000a0a5257b23262d5d295c00000000000000000100"], 0xb8) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000040)=ANY=[], &(0x7f0000000000)=""/27, 0x20, 0x1b, 0xfffffffe, 0x1}, 0x20) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:13:01 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000400000002005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1f, 0x9, 0x94, 0x2, 0x2, r2, 0x7, '\x00', 0x0, r3, 0x0, 0x4, 0x3}, 0x48) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) write$cgroup_devices(r2, &(0x7f0000000200)={'a', ' *:* ', 'wm\x00'}, 0x9) (async) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x3f) 00:13:01 executing program 1: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002180)=ANY=[@ANYBLOB="b800000000000000", @ANYRES64=r1, @ANYBLOB="00000000000000000300000000000000800f000000000000f10000000000000047050000090000000000000000000000a8000000000000000100008000000000000000000100000005000000000000007c000000000000000001000000000000faffffff0020000003000000", @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="0800000006000000000000000000000004060000000500000000000000000000a0a5257b23262d5d295c00000000000000000100"], 0xb8) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000040)=ANY=[], &(0x7f0000000000)=""/27, 0x20, 0x1b, 0xfffffffe, 0x1}, 0x20) 00:13:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:13:01 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x2010, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:01 executing program 1: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) sched_getattr(r0, &(0x7f0000000000)={0x38}, 0x38, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 5: syz_clone(0x4300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:13:01 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x2010, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x2010, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:13:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) (async) sendmsg$NFC_CMD_GET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) 00:13:01 executing program 1: syz_clone(0x4300, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) sched_getattr(r0, &(0x7f0000000000)={0x38}, 0x38, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(r0) (async) sched_getattr(r0, &(0x7f0000000000)={0x38}, 0x38, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:01 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x2010, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x401, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 2: r0 = socket(0x1d, 0x5, 0x3f) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1}, &(0x7f0000000140)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:01 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) (async, rerun: 32) sched_getattr(r0, &(0x7f0000000000)={0x38}, 0x38, 0x0) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:01 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) (async) sendmsg$NFC_CMD_GET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) (async) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4100006, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 00:13:01 executing program 2: r0 = socket(0x1d, 0x5, 0x3f) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1}, &(0x7f0000000140)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) socket(0x1d, 0x5, 0x3f) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) (async) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1}, &(0x7f0000000140)=0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="109feb010018000000000000000c2300000c0000000500000002e5ffffffffff05040000000000005f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 00:13:01 executing program 2: r0 = socket(0x1d, 0x5, 0x3f) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1}, &(0x7f0000000140)=0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="109feb010018000000000000000c2300000c0000000500000002e5ffffffffff05040000000000005f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) 00:13:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x6}, 0x48) 00:13:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80002400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:13:01 executing program 1: syz_clone(0x4300, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="109feb010018000000000000000c2300000c0000000500000002e5ffffffffff05040000000000005f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="109feb010018000000000000000c2300000c0000000500000002e5ffffffffff05040000000000005f00"], 0x0, 0x29, 0x0, 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) 00:13:01 executing program 2: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 00:13:01 executing program 3: syz_clone(0x0, &(0x7f0000000140)="763df9bb6c599e1d19562b56bb9ac1089a52cbfdda057aee179d02ca987b3b43d0d14de0d79c8fcf005598277765bd43d7b835aae54dfb1a5e3dd3bcc66d0e820e9143fd98fba117b97433b092b71f79b5c3085a0d9fedb0a40b84eec03a415ebcad8fff93b67139a1e1d4ff1fa8c95c728be9feedd8458093f0a318b2dbd84b5cfca26b63001b4588eee52731b306d249b00677261b3c86351cc1a15883b3220f2ab9a80803", 0xa6, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x38, 0x18, 0x1}, 0x20) 00:13:01 executing program 0: sendmsg$NFC_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000013c0)={&(0x7f00000002c0)={0x10ec, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_VENDOR_DATA={0x4}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x2}, @NFC_ATTR_VENDOR_DATA={0x1004, 0x1f, "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"}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_DATA={0xbf, 0x1f, "d34cfe99d967dff6f87297cf20110794ed85d45c21c42271ab0e59552a80bf7ed559c542b247143dfa98e0027222a873a07e669f88abe66bacdb26d2f37bbbaeca75f1c5437791b2a2514adf0235c964a5c4c54057f12f597eb308923de5b82f33aafb0f35eb0274e4c286ce8bf74de103f5b7a9667bc4c8ee729270fcc0cb1f71051b40d409137a1bfc9d2f55b00cb3b33ccefa316a9c227ef973455780a8ee87e0a391c0ec9b43ebb98fd721fadd30d0117351832901d5f43191"}]}, 0x10ec}, 0x1, 0x0, 0x0, 0x40000}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x20, &(0x7f00000000c0)={&(0x7f0000000140)=""/255, 0xff, 0x0, &(0x7f0000000080)=""/24, 0x18}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={r0, 0x20, &(0x7f00000015c0)={&(0x7f0000001440)=""/98, 0x62, 0x0, &(0x7f00000014c0)=""/217, 0xd9}}, 0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xc5ae}, 0x8) 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x400, 0x2, 0x0, 0x6, 0x4, [{0x1}, {0x1, 0x4}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x80000}, 0x20) 00:13:01 executing program 2: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 00:13:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x38, 0x18, 0x1}, 0x20) 00:13:01 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 00:13:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x400, 0x2, 0x0, 0x6, 0x4, [{0x1}, {0x1, 0x4}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x80000}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x400, 0x2, 0x0, 0x6, 0x4, [{0x1}, {0x1, 0x4}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x80000}, 0x20) (async) 00:13:01 executing program 0: sendmsg$NFC_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000013c0)={&(0x7f00000002c0)={0x10ec, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_VENDOR_DATA={0x4}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x2}, @NFC_ATTR_VENDOR_DATA={0x1004, 0x1f, "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"}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_DATA={0xbf, 0x1f, "d34cfe99d967dff6f87297cf20110794ed85d45c21c42271ab0e59552a80bf7ed559c542b247143dfa98e0027222a873a07e669f88abe66bacdb26d2f37bbbaeca75f1c5437791b2a2514adf0235c964a5c4c54057f12f597eb308923de5b82f33aafb0f35eb0274e4c286ce8bf74de103f5b7a9667bc4c8ee729270fcc0cb1f71051b40d409137a1bfc9d2f55b00cb3b33ccefa316a9c227ef973455780a8ee87e0a391c0ec9b43ebb98fd721fadd30d0117351832901d5f43191"}]}, 0x10ec}, 0x1, 0x0, 0x0, 0x40000}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x20, &(0x7f00000000c0)={&(0x7f0000000140)=""/255, 0xff, 0x0, &(0x7f0000000080)=""/24, 0x18}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={r0, 0x20, &(0x7f00000015c0)={&(0x7f0000001440)=""/98, 0x62, 0x0, &(0x7f00000014c0)=""/217, 0xd9}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={r0, 0x20, &(0x7f00000015c0)={&(0x7f0000001440)=""/98, 0x62, 0x0, &(0x7f00000014c0)=""/217, 0xd9}}, 0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xc5ae}, 0x8) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x400, 0x2, 0x0, 0x6, 0x4, [{0x1}, {0x1, 0x4}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x80000}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x38, 0x18, 0x1}, 0x20) 00:13:02 executing program 0: sendmsg$NFC_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000013c0)={&(0x7f00000002c0)={0x10ec, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_VENDOR_DATA={0x4}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x2}, @NFC_ATTR_VENDOR_DATA={0x1004, 0x1f, "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"}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_DATA={0xbf, 0x1f, "d34cfe99d967dff6f87297cf20110794ed85d45c21c42271ab0e59552a80bf7ed559c542b247143dfa98e0027222a873a07e669f88abe66bacdb26d2f37bbbaeca75f1c5437791b2a2514adf0235c964a5c4c54057f12f597eb308923de5b82f33aafb0f35eb0274e4c286ce8bf74de103f5b7a9667bc4c8ee729270fcc0cb1f71051b40d409137a1bfc9d2f55b00cb3b33ccefa316a9c227ef973455780a8ee87e0a391c0ec9b43ebb98fd721fadd30d0117351832901d5f43191"}]}, 0x10ec}, 0x1, 0x0, 0x0, 0x40000}, 0x40) (async) sendmsg$NFC_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000013c0)={&(0x7f00000002c0)={0x10ec, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_VENDOR_DATA={0x4}, @NFC_ATTR_VENDOR_ID={0x8, 0x1d, 0x2}, @NFC_ATTR_VENDOR_DATA={0x1004, 0x1f, "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"}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_VENDOR_DATA={0xbf, 0x1f, "d34cfe99d967dff6f87297cf20110794ed85d45c21c42271ab0e59552a80bf7ed559c542b247143dfa98e0027222a873a07e669f88abe66bacdb26d2f37bbbaeca75f1c5437791b2a2514adf0235c964a5c4c54057f12f597eb308923de5b82f33aafb0f35eb0274e4c286ce8bf74de103f5b7a9667bc4c8ee729270fcc0cb1f71051b40d409137a1bfc9d2f55b00cb3b33ccefa316a9c227ef973455780a8ee87e0a391c0ec9b43ebb98fd721fadd30d0117351832901d5f43191"}]}, 0x10ec}, 0x1, 0x0, 0x0, 0x40000}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x20, &(0x7f00000000c0)={&(0x7f0000000140)=""/255, 0xff, 0x0, &(0x7f0000000080)=""/24, 0x18}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={r0, 0x20, &(0x7f00000015c0)={&(0x7f0000001440)=""/98, 0x62, 0x0, &(0x7f00000014c0)=""/217, 0xd9}}, 0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xc5ae}, 0x8) 00:13:02 executing program 2: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 00:13:02 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x4, [@enum, @union={0x5, 0x7, 0x0, 0x5, 0x1, 0x5, [{0xa, 0x5, 0x1000}, {0xc, 0x0, 0x1}, {0x0, 0x5, 0xfffffff7}, {0x1, 0x5, 0x1}, {0x4, 0x3, 0x4}, {0xd, 0x5, 0x5}, {0xc, 0x2, 0x7}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x94, 0x1b, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, r0, 0x0, 0x1, 0x4}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x9, '\x00', 0x0, r0, 0x4, 0x2, 0x4}, 0x48) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x800) 00:13:02 executing program 1: syz_clone(0x4300, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="be67c87e6a9cdc13012330d8bde04a673f7b615d144478b5e26f433e2926dcc0b83b51cb52510a14d93c81") 00:13:02 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e1e, @private=0xa010101}, @in6={0xa, 0x4e22, 0xc, @empty, 0xff}, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e21, 0xa070, @private2={0xfc, 0x2, '\x00', 0xfe}, 0xff}], 0x58) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000c00000005900000020000000000000604000000007f5f5f00"], 0x0, 0x35, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x0, 0x4, 0x1}, 0x48) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x10, 0x6, 0xff}, &(0x7f00000001c0)=0x18) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:02 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x4, [@enum, @union={0x5, 0x7, 0x0, 0x5, 0x1, 0x5, [{0xa, 0x5, 0x1000}, {0xc, 0x0, 0x1}, {0x0, 0x5, 0xfffffff7}, {0x1, 0x5, 0x1}, {0x4, 0x3, 0x4}, {0xd, 0x5, 0x5}, {0xc, 0x2, 0x7}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x94, 0x1b, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, r0, 0x0, 0x1, 0x4}, 0x48) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x9, '\x00', 0x0, r0, 0x4, 0x2, 0x4}, 0x48) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x800) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 00:13:02 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x4, [@enum, @union={0x5, 0x7, 0x0, 0x5, 0x1, 0x5, [{0xa, 0x5, 0x1000}, {0xc, 0x0, 0x1}, {0x0, 0x5, 0xfffffff7}, {0x1, 0x5, 0x1}, {0x4, 0x3, 0x4}, {0xd, 0x5, 0x5}, {0xc, 0x2, 0x7}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x94, 0x1b, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, r0, 0x0, 0x1, 0x4}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x9, '\x00', 0x0, r0, 0x4, 0x2, 0x4}, 0x48) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x800) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:02 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e1e, @private=0xa010101}, @in6={0xa, 0x4e22, 0xc, @empty, 0xff}, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e21, 0xa070, @private2={0xfc, 0x2, '\x00', 0xfe}, 0xff}], 0x58) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000c00000005900000020000000000000604000000007f5f5f00"], 0x0, 0x35, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x0, 0x4, 0x1}, 0x48) (async) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x10, 0x6, 0xff}, &(0x7f00000001c0)=0x18) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000800000000000000000400000002000000000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:13:02 executing program 0: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e1e, @private=0xa010101}, @in6={0xa, 0x4e22, 0xc, @empty, 0xff}, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e21, 0xa070, @private2={0xfc, 0x2, '\x00', 0xfe}, 0xff}], 0x58) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000c00000005900000020000000000000604000000007f5f5f00"], 0x0, 0x35, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x0, 0x4, 0x1}, 0x48) (async) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x10, 0x6, 0xff}, &(0x7f00000001c0)=0x18) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) (async) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=0x1, @ANYBLOB="00000000000000002ebcdde1bbd2ab6221fcd956af6afb16d20503c31dc18975ee8be5f7c56820ddb2b509c30586a971ce63c4824d3789726353286e4ff8258def8a3eff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x41100, 0x40, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x1, 0x8, 0xfffffffa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 00:13:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000800000000000000000400000002000000000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) (async) syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) (async) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) (async) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:13:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000800000000000000000400000002000000000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) 00:13:02 executing program 1: syz_clone(0x4300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000040000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:13:02 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x14, 0x0, 0xffffffffffffffff, &(0x7f0000000000)=0x80, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, 0x80800}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 00:13:02 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x14, 0x0, 0xffffffffffffffff, &(0x7f0000000000)=0x80, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, 0x80800}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x14, 0x0, 0xffffffffffffffff, &(0x7f0000000000)=0x80, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, 0x80800}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000040000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x5f, 0x5f, 0x5f]}}, 0x0, 0x29}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:02 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x14, 0x0, 0xffffffffffffffff, &(0x7f0000000000)=0x80, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, 0x80800}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000040000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000040000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x5f, 0x5f, 0x5f]}}, 0x0, 0x29}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018010000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x5f, 0x5f, 0x5f]}}, 0x0, 0x29}, 0x20) 00:13:02 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0xe7, 0x5, 0x5, 0x41, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @mcast1, 0x7, 0x1, 0x9, 0x9}}) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, r1, 0x3, 0x1, 0x3}, 0x48) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018010000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:02 executing program 1: syz_clone(0x4300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018010000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0xe7, 0x5, 0x5, 0x41, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @mcast1, 0x7, 0x1, 0x9, 0x9}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, r1, 0x3, 0x1, 0x3}, 0x48) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x115881, 0x0) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c000000659b00000404000002000000000000260400000000005f00838ff8fc1640db59b7faa060ae7c7f738823b8e3f83dc96210d26d463681d5d805a38106702fc1b056167b0d20d7ae57d44bed2bbd2f91f8e8cfdb36802bf15658f2b3874be08dc7c1e05f02a65a5153ed767ca991558520a1edfe54966e65d3181fab54c2d76de03e7c57c286070ce861eec073ef7e3006f9e30de5c3ab99a69c5939b11aa843a1b1fca9495c896632275d293d0cb632282d041bfbd24ca5ebcb99d4b581000000000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0xe7, 0x5, 0x5, 0x41, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @mcast1, 0x7, 0x1, 0x9, 0x9}}) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, r1, 0x3, 0x1, 0x3}, 0x48) keyctl$set_reqkey_keyring(0xe, 0x6) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000060400000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0xe7, 0x5, 0x5, 0x41, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @mcast1, 0x7, 0x1, 0x9, 0x9}}) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', r0, r1, 0x3, 0x1, 0x3}, 0x48) (async) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) (async) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x115881, 0x0) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9febc4ce94d957f8c766d0010018000000000c0004000c000000080000000200000020000006c80e266980db6dbad51dc5bd79ffde57f17f7efb5a52c5d5dd5dc518cae56aac5c75a05a90a8fba79aacd909d5d305afa88a2fe612068fe7857f5c46262995820f924bdbe3aaacc73bc3db3a36d4f36ffed127f87673fc6f000000a9ff2d679cd87d85f0ba2ab0cc9b3abc790fb1f63f9f890d19dfbc2b36cb20f2b2a8b7fbdf591860ca7e214ceacea3a0d802eafcb5c2261144edf44c28ff189034b2cf84d7f6d024f2d71b4bc40cd7566bae20e6d72fb26bf5b20a3d3bb2dc1dc62412d35a8b740a482703b93e8e17da5fb5c526e979080f64b9823c1e9ee0ef3ac1528636f63144f3ccdebb2b45ca7a5c2336571ba6d3c3c42022c5c99047e145a755bba5d4659171272b0f81931c0daf8c"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x115881, 0x0) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x115881, 0x0) [ 782.744499][T32438] nbd2: detected capacity change from 0 to 1 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x38, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x2c, 0x3, 0x1) (async) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) 00:13:02 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x8000, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0xc, 0x800}]}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000280)=""/43, 0x38, 0x2b, 0x1}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00'}, 0x18) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000000080)=0xe) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0xf71, 0x0, r1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) 00:13:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) [ 782.822283][T32462] sctp: [Deprecated]: syz-executor.4 (pid 32462) Use of int in maxseg socket option. [ 782.822283][T32462] Use struct sctp_assoc_value instead 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x38, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x8000, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0xc, 0x800}]}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000280)=""/43, 0x38, 0x2b, 0x1}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00'}, 0x18) (async) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000000080)=0xe) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0xf71, 0x0, r1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9febc4ce94d957f8c766d0010018000000000c0004000c000000080000000200000020000006c80e266980db6dbad51dc5bd79ffde57f17f7efb5a52c5d5dd5dc518cae56aac5c75a05a90a8fba79aacd909d5d305afa88a2fe612068fe7857f5c46262995820f924bdbe3aaacc73bc3db3a36d4f36ffed127f87673fc6f000000a9ff2d679cd87d85f0ba2ab0cc9b3abc790fb1f63f9f890d19dfbc2b36cb20f2b2a8b7fbdf591860ca7e214ceacea3a0d802eafcb5c2261144edf44c28ff189034b2cf84d7f6d024f2d71b4bc40cd7566bae20e6d72fb26bf5b20a3d3bb2dc1dc62412d35a8b740a482703b93e8e17da5fb5c526e979080f64b9823c1e9ee0ef3ac1528636f63144f3ccdebb2b45ca7a5c2336571ba6d3c3c42022c5c99047e145a755bba5d4659171272b0f81931c0daf8c"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x2c, 0x3, 0x1) (async) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) 00:13:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) [ 782.878965][T32473] sctp: [Deprecated]: syz-executor.4 (pid 32473) Use of int in maxseg socket option. [ 782.878965][T32473] Use struct sctp_assoc_value instead 00:13:02 executing program 3: socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0xa, 0x0, 0x0, 0x5, 0x1, 0x100, [{0x11, 0x3, 0x8}, {0x7, 0x3, 0x5}]}]}}, 0x0, 0x26, 0xb, 0x1}, 0x20) 00:13:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x8000, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0xc, 0x800}]}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000280)=""/43, 0x38, 0x2b, 0x1}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00'}, 0x18) (async) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000000080)=0xe) (async) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0xf71, 0x0, r1, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x48) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x38, 0x18, 0x1}, 0x20) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0xa, 0x0, 0x0, 0x5, 0x1, 0x100, [{0x11, 0x3, 0x8}, {0x7, 0x3, 0x5}]}]}}, 0x0, 0x26, 0xb, 0x1}, 0x20) 00:13:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9febc4ce94d957f8c766d0010018000000000c0004000c000000080000000200000020000006c80e266980db6dbad51dc5bd79ffde57f17f7efb5a52c5d5dd5dc518cae56aac5c75a05a90a8fba79aacd909d5d305afa88a2fe612068fe7857f5c46262995820f924bdbe3aaacc73bc3db3a36d4f36ffed127f87673fc6f000000a9ff2d679cd87d85f0ba2ab0cc9b3abc790fb1f63f9f890d19dfbc2b36cb20f2b2a8b7fbdf591860ca7e214ceacea3a0d802eafcb5c2261144edf44c28ff189034b2cf84d7f6d024f2d71b4bc40cd7566bae20e6d72fb26bf5b20a3d3bb2dc1dc62412d35a8b740a482703b93e8e17da5fb5c526e979080f64b9823c1e9ee0ef3ac1528636f63144f3ccdebb2b45ca7a5c2336571ba6d3c3c42022c5c99047e145a755bba5d4659171272b0f81931c0daf8c"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f00000001c0)={&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)=""/125, 0x7d}}, 0x10) [ 782.932432][T32487] sctp: [Deprecated]: syz-executor.4 (pid 32487) Use of int in maxseg socket option. [ 782.932432][T32487] Use struct sctp_assoc_value instead 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) 00:13:02 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb00000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00cae6ef2975b8beec0f259d5d4d7ccd8df51f0b1dfaeb3bb3570d2b76c9ebac0c0045674bd6c0c83e4f5517cb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x93, 0x93, 0xa, [@func={0x2, 0x0, 0x0, 0xc, 0x10001}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x72}}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10, 0x4}, {0x6}]}, @var={0x11, 0x0, 0x0, 0xe, 0x1}, @func={0x5, 0x0, 0x0, 0xc, 0x4}, @datasec={0x1, 0x2, 0x0, 0xf, 0x3, [{0x1, 0x3, 0x40}, {0x5, 0x1f, 0x9}], "6b1e40"}, @var={0x2, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x61, 0x30, 0x5f, 0x2e, 0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000000)=""/54, 0xb6, 0x36, 0x1, 0xfffffffe}, 0x20) 00:13:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:02 executing program 3: socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0xa, 0x0, 0x0, 0x5, 0x1, 0x100, [{0x11, 0x3, 0x8}, {0x7, 0x3, 0x5}]}]}}, 0x0, 0x26, 0xb, 0x1}, 0x20) 00:13:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 00:13:03 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb00000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00cae6ef2975b8beec0f259d5d4d7ccd8df51f0b1dfaeb3bb3570d2b76c9ebac0c0045674bd6c0c83e4f5517cb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x93, 0x93, 0xa, [@func={0x2, 0x0, 0x0, 0xc, 0x10001}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x72}}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10, 0x4}, {0x6}]}, @var={0x11, 0x0, 0x0, 0xe, 0x1}, @func={0x5, 0x0, 0x0, 0xc, 0x4}, @datasec={0x1, 0x2, 0x0, 0xf, 0x3, [{0x1, 0x3, 0x40}, {0x5, 0x1f, 0x9}], "6b1e40"}, @var={0x2, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x61, 0x30, 0x5f, 0x2e, 0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000000)=""/54, 0xb6, 0x36, 0x1, 0xfffffffe}, 0x20) [ 783.536951][T13220] block nbd2: Receive control failed (result -104) [ 783.540093][T32438] block nbd2: shutting down sockets [ 783.546117][ C1] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.548299][ C1] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.551882][T31971] ldm_validate_partition_table(): Disk read failed. [ 783.553682][T31971] Dev nbd2: unable to read RDB block 0 [ 783.554888][T31971] nbd2: unable to read partition table [ 783.556135][T31971] nbd2: partition table beyond EOD, truncated 00:13:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) (async) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) (async, rerun: 32) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) (async, rerun: 32) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) (rerun: 32) 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 3: socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffffffffffee6) 00:13:03 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb00000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00cae6ef2975b8beec0f259d5d4d7ccd8df51f0b1dfaeb3bb3570d2b76c9ebac0c0045674bd6c0c83e4f5517cb"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x93, 0x93, 0xa, [@func={0x2, 0x0, 0x0, 0xc, 0x10001}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x72}}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x10, 0x4}, {0x6}]}, @var={0x11, 0x0, 0x0, 0xe, 0x1}, @func={0x5, 0x0, 0x0, 0xc, 0x4}, @datasec={0x1, 0x2, 0x0, 0xf, 0x3, [{0x1, 0x3, 0x40}, {0x5, 0x1f, 0x9}], "6b1e40"}, @var={0x2, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x61, 0x30, 0x5f, 0x2e, 0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000000)=""/54, 0xb6, 0x36, 0x1, 0xfffffffe}, 0x20) 00:13:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7f, '\x00', 0x0, r0, 0x3, 0x2, 0x5}, 0x48) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/162, 0x80, 0xa2, 0x0, 0xfffffff7}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x80000001, 0x5, 0x6, 0x2201, r0, 0x751, '\x00', 0x0, r1, 0x5, 0x4}, 0x48) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/162, 0x80, 0xa2, 0x0, 0xfffffff7}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x80000001, 0x5, 0x6, 0x2201, r0, 0x751, '\x00', 0x0, r1, 0x5, 0x4}, 0x48) 00:13:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9febc4ce94d957f8c766d0010018000000000c0004000c000000080000000200000020000006c80e266980db6dbad51dc5bd79ffde57f17f7efb5a52c5d5dd5dc518cae56aac5c75a05a90a8fba79aacd909d5d305afa88a2fe612068fe7857f5c46262995820f924bdbe3aaacc73bc3db3a36d4f36ffed127f87673fc6f000000a9ff2d679cd87d85f0ba2ab0cc9b3abc790fb1f63f9f890d19dfbc2b36cb20f2b2a8b7fbdf591860ca7e214ceacea3a0d802eafcb5c2261144edf44c28ff189034b2cf84d7f6d024f2d71b4bc40cd7566bae20e6d72fb26bf5b20a3d3bb2dc1dc62412d35a8b740a482703b93e8e17da5fb5c526e979080f64b9823c1e9ee0ef3ac1528636f63144f3ccdebb2b45ca7a5c2336571ba6d3c3c42022c5c99047e145a755bba5d4659171272b0f81931c0daf8c"], 0x0, 0x29, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000080)) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/162, 0x80, 0xa2, 0x0, 0xfffffff7}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x80000001, 0x5, 0x6, 0x2201, r0, 0x751, '\x00', 0x0, r1, 0x5, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x80000001, 0x5, 0x6, 0x2201, r0, 0x751, '\x00', 0x0, r1, 0x5, 0x4}, 0x48) [ 783.669287][T32526] nbd2: detected capacity change from 0 to 1 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000080)) 00:13:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="9febc4ce94d957f8c766d0010018000000000c0004000c000000080000000200000020000006c80e266980db6dbad51dc5bd79ffde57f17f7efb5a52c5d5dd5dc518cae56aac5c75a05a90a8fba79aacd909d5d305afa88a2fe612068fe7857f5c46262995820f924bdbe3aaacc73bc3db3a36d4f36ffed127f87673fc6f000000a9ff2d679cd87d85f0ba2ab0cc9b3abc790fb1f63f9f890d19dfbc2b36cb20f2b2a8b7fbdf591860ca7e214ceacea3a0d802eafcb5c2261144edf44c28ff189034b2cf84d7f6d024f2d71b4bc40cd7566bae20e6d72fb26bf5b20a3d3bb2dc1dc62412d35a8b740a482703b93e8e17da5fb5c526e979080f64b9823c1e9ee0ef3ac1528636f63144f3ccdebb2b45ca7a5c2336571ba6d3c3c42022c5c99047e145a755bba5d4659171272b0f81931c0daf8c"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = socket(0x2c, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, [0x8000, 0x7, 0x6, 0x3ff, 0x8, 0x9e36, 0x5, 0x400, 0x6, 0x800, 0x12af4406, 0x7, 0xffffffffffff8000, 0x6, 0x9]}, &(0x7f0000000000)=0x100) 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000001020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x1, 0x401, 0xc475, 0x1af}, 0x10) 00:13:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x2c, 0x3, 0x1) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) [ 783.724519][T32526] block nbd2: shutting down sockets 00:13:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000080)) [ 783.736999][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.739247][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.741739][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.743900][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.745718][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.747819][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.749711][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.751796][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.754643][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.756666][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.758555][T31971] ldm_validate_partition_table(): Disk read failed. [ 783.760550][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.762622][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 783.766340][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.768425][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.770601][ T54] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.772594][ T54] Buffer I/O error on dev nbd2, logical block 0, async page read [ 783.774717][T31971] Dev nbd2: unable to read RDB block 0 [ 783.776008][T31971] nbd2: unable to read partition table 00:13:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x0, 0x29, 0x0, 0x1}, 0x20) socket(0x2c, 0x3, 0x1) [ 783.777269][T31971] nbd2: partition table beyond EOD, truncated 00:13:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) (async) syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) (async) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) (async) ioctl$NBD_DO_IT(r0, 0xab03) (async) syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) (async) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) (async) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) (async) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000001020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x1, 0x401, 0xc475, 0x1af}, 0x10) (async) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x1, 0x401, 0xc475, 0x1af}, 0x10) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000001020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x1, 0x401, 0xc475, 0x1af}, 0x10) 00:13:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfa2, '\x00', 0x0, r0, 0x5, 0x2, 0x3}, 0x48) 00:13:03 executing program 1: socket(0x2c, 0x3, 0x1) 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 783.874917][T32558] nbd2: detected capacity change from 0 to 1 00:13:03 executing program 1: socket(0x0, 0x3, 0x1) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfa2, '\x00', 0x0, r0, 0x5, 0x2, 0x3}, 0x48) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfa2, '\x00', 0x0, r0, 0x5, 0x2, 0x3}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfa2, '\x00', 0x0, r0, 0x5, 0x2, 0x3}, 0x48) (async) 00:13:03 executing program 1: socket(0x0, 0x3, 0x1) 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c000000199a0000040000000000000002000006040000000200005f5f00fe8aea8d67d8210955187d5d84484ee2482b4842bea12f2c079bcfe533c15236bdfc609c2958cbdc25ad491ca8d0e6cfcdfe26371bf3671b6fe2d6c62e33"], &(0x7f0000000080)=""/35, 0x38, 0x23, 0x3}, 0x20) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x185100) [ 783.984350][T32558] block nbd2: shutting down sockets 00:13:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) [ 783.996104][ C0] I/O error, dev nbd2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 783.998250][ C0] Buffer I/O error on dev nbd2, logical block 0, async page read 00:13:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c000000199a0000040000000000000002000006040000000200005f5f00fe8aea8d67d8210955187d5d84484ee2482b4842bea12f2c079bcfe533c15236bdfc609c2958cbdc25ad491ca8d0e6cfcdfe26371bf3671b6fe2d6c62e33"], &(0x7f0000000080)=""/35, 0x38, 0x23, 0x3}, 0x20) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x185100) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c000000199a0000040000000000000002000006040000000200005f5f00fe8aea8d67d8210955187d5d84484ee2482b4842bea12f2c079bcfe533c15236bdfc609c2958cbdc25ad491ca8d0e6cfcdfe26371bf3671b6fe2d6c62e33"], &(0x7f0000000080)=""/35, 0x38, 0x23, 0x3}, 0x20) (async) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x185100) (async) 00:13:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) [ 784.004466][T31971] ldm_validate_partition_table(): Disk read failed. [ 784.005901][T31971] Dev nbd2: unable to read RDB block 0 [ 784.007191][T31971] nbd2: unable to read partition table [ 784.008519][T31971] nbd2: partition table beyond EOD, truncated 00:13:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x0, 0x3, 0x1) 00:13:04 executing program 2: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r6, {0x0, 0x2}}, 0x20) write$FUSE_ATTR(r5, &(0x7f0000000300)={0x78, 0x0, r6, {0x7, 0x6, 0x0, {0x3, 0xe0, 0x5, 0x2, 0x5, 0x7, 0x4ab9, 0xd2, 0x6, 0x2000, 0x112d, r2, r3, 0x54, 0x9}}}, 0x78) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) write$FUSE_BMAP(r4, &(0x7f0000000180)={0x18, 0x0, r1, {0x2}}, 0x18) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, r1, {0x7, 0x27, 0x2020000, 0x2000, 0xf99b, 0x2, 0x81, 0x8000}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000000000000000e483da1b08000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000200)=0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x404, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, r1, {0x0, 0x8}}, 0x20) 00:13:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c000000199a0000040000000000000002000006040000000200005f5f00fe8aea8d67d8210955187d5d84484ee2482b4842bea12f2c079bcfe533c15236bdfc609c2958cbdc25ad491ca8d0e6cfcdfe26371bf3671b6fe2d6c62e33"], &(0x7f0000000080)=""/35, 0x38, 0x23, 0x3}, 0x20) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x185100) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 2: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r6, {0x0, 0x2}}, 0x20) write$FUSE_ATTR(r5, &(0x7f0000000300)={0x78, 0x0, r6, {0x7, 0x6, 0x0, {0x3, 0xe0, 0x5, 0x2, 0x5, 0x7, 0x4ab9, 0xd2, 0x6, 0x2000, 0x112d, r2, r3, 0x54, 0x9}}}, 0x78) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) write$FUSE_BMAP(r4, &(0x7f0000000180)={0x18, 0x0, r1, {0x2}}, 0x18) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) (async, rerun: 32) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, r1, {0x7, 0x27, 0x2020000, 0x2000, 0xf99b, 0x2, 0x81, 0x8000}}, 0x50) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000000000000000e483da1b08000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000200)=0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x404, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, r1, {0x0, 0x8}}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req={0x8, 0xeca3, 0x0, 0xc96}, 0x10) ioctl$RFKILL_IOC_MAX_SIZE(r0, 0x2, &(0x7f0000000080)=0xfffffeff) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000180), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000000000000200000604000000020000000000000001ff010000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfa2, '\x00', 0x0, r0, 0x5, 0x2, 0x3}, 0x48) 00:13:04 executing program 1: socket(0x2c, 0x0, 0x1) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 2: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r6, {0x0, 0x2}}, 0x20) write$FUSE_ATTR(r5, &(0x7f0000000300)={0x78, 0x0, r6, {0x7, 0x6, 0x0, {0x3, 0xe0, 0x5, 0x2, 0x5, 0x7, 0x4ab9, 0xd2, 0x6, 0x2000, 0x112d, r2, r3, 0x54, 0x9}}}, 0x78) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) write$FUSE_BMAP(r4, &(0x7f0000000180)={0x18, 0x0, r1, {0x2}}, 0x18) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, r1, {0x7, 0x27, 0x2020000, 0x2000, 0xf99b, 0x2, 0x81, 0x8000}}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000000000000000e483da1b08000000"], 0x0, 0x28, 0x0, 0x1}, 0x20) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000200)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000200)=0x0) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x404, 0x70bd2d, 0x25dfdbfc, {}, [@NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4081}, 0x40000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, r1, {0x0, 0x8}}, 0x20) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req={0x8, 0xeca3, 0x0, 0xc96}, 0x10) (async) ioctl$RFKILL_IOC_MAX_SIZE(r0, 0x2, &(0x7f0000000080)=0xfffffeff) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async, rerun: 64) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 64) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000180), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000000000000200000604000000020000000000000001ff010000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:04 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x4) bind$packet(r0, &(0x7f0000000080)={0x11, 0x9, r1, 0x1, 0x4, 0x6, @local}, 0x14) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000600)={0x8, &(0x7f00000005c0)=[{0x5, 0x80, 0x8, 0x8000}, {0x1e, 0x6, 0x6, 0x3}, {0x8000, 0x40, 0x40}, {0x44, 0x3, 0x46}, {0x40, 0x7f, 0x0, 0x4}, {0x80, 0x7, 0x6, 0x7}, {0x74b3, 0xa0, 0xa9, 0x4}, {0x5, 0x1f, 0x40, 0xffffffff}]}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000200)=r0}, 0x20) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0xc89, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x48) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x101, 0x101, 0x6, [@datasec={0xb, 0x1, 0x0, 0xf, 0x2, [{0x1}], "f36c"}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x4}, {0x1, 0x1}, {0xe, 0x1}, {0x7, 0x5}, {0x8, 0x3}, {0x10, 0x5}]}, @union={0x8, 0x5, 0x0, 0x5, 0x1, 0x3, [{0x5, 0x5, 0x8001}, {0xc, 0x2, 0x5}, {0x3, 0x2, 0x43f}, {0xa, 0x0, 0x5}, {0xa, 0x4, 0x6}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x3}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @volatile={0xa, 0x0, 0x0, 0x9, 0x5}, @datasec={0xc, 0x3, 0x0, 0xf, 0x3, [{0x5, 0x10000}, {0x1, 0x504, 0x8}, {0x4, 0x8, 0x101}], "dc16c0"}]}, {0x0, [0x0, 0x0, 0x30, 0x1e]}}, &(0x7f0000000400)=""/220, 0x122, 0xdc}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x81, '\x00', 0x0, r5, 0x0, 0x3, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000380000000c000000040000000e00000000000006040000000c0000003f0000000700000000000000050000002000000000000000d00a000003000000c1ffffff00005f00f7232abd9aae13118731fad265155ab20ca65f68fa61c047e7be6a3a151b492423464cf730dd39524268c5af0492a5aba0bdb4a2"], 0x0, 0x28}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x0, 0x1) 00:13:04 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x4) bind$packet(r0, &(0x7f0000000080)={0x11, 0x9, r1, 0x1, 0x4, 0x6, @local}, 0x14) (async, rerun: 64) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 64) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000600)={0x8, &(0x7f00000005c0)=[{0x5, 0x80, 0x8, 0x8000}, {0x1e, 0x6, 0x6, 0x3}, {0x8000, 0x40, 0x40}, {0x44, 0x3, 0x46}, {0x40, 0x7f, 0x0, 0x4}, {0x80, 0x7, 0x6, 0x7}, {0x74b3, 0xa0, 0xa9, 0x4}, {0x5, 0x1f, 0x40, 0xffffffff}]}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000200)=r0}, 0x20) (async, rerun: 64) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 64) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0xc89, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x48) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x101, 0x101, 0x6, [@datasec={0xb, 0x1, 0x0, 0xf, 0x2, [{0x1}], "f36c"}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x4}, {0x1, 0x1}, {0xe, 0x1}, {0x7, 0x5}, {0x8, 0x3}, {0x10, 0x5}]}, @union={0x8, 0x5, 0x0, 0x5, 0x1, 0x3, [{0x5, 0x5, 0x8001}, {0xc, 0x2, 0x5}, {0x3, 0x2, 0x43f}, {0xa, 0x0, 0x5}, {0xa, 0x4, 0x6}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x3}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @volatile={0xa, 0x0, 0x0, 0x9, 0x5}, @datasec={0xc, 0x3, 0x0, 0xf, 0x3, [{0x5, 0x10000}, {0x1, 0x504, 0x8}, {0x4, 0x8, 0x101}], "dc16c0"}]}, {0x0, [0x0, 0x0, 0x30, 0x1e]}}, &(0x7f0000000400)=""/220, 0x122, 0xdc}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x81, '\x00', 0x0, r5, 0x0, 0x3, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000380000000c000000040000000e00000000000006040000000c0000003f0000000700000000000000050000002000000000000000d00a000003000000c1ffffff00005f00f7232abd9aae13118731fad265155ab20ca65f68fa61c047e7be6a3a151b492423464cf730dd39524268c5af0492a5aba0bdb4a2"], 0x0, 0x28}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req={0x8, 0xeca3, 0x0, 0xc96}, 0x10) ioctl$RFKILL_IOC_MAX_SIZE(r0, 0x2, &(0x7f0000000080)=0xfffffeff) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000000)=0x1, 0x4) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000180), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000000000000200000604000000020000000000000001ff010000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x0, 0x1) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x3, 0x0) 00:13:04 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x4) bind$packet(r0, &(0x7f0000000080)={0x11, 0x9, r1, 0x1, 0x4, 0x6, @local}, 0x14) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000600)={0x8, &(0x7f00000005c0)=[{0x5, 0x80, 0x8, 0x8000}, {0x1e, 0x6, 0x6, 0x3}, {0x8000, 0x40, 0x40}, {0x44, 0x3, 0x46}, {0x40, 0x7f, 0x0, 0x4}, {0x80, 0x7, 0x6, 0x7}, {0x74b3, 0xa0, 0xa9, 0x4}, {0x5, 0x1f, 0x40, 0xffffffff}]}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000200)=r0}, 0x20) (async, rerun: 64) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 64) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0xc89, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x48) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x101, 0x101, 0x6, [@datasec={0xb, 0x1, 0x0, 0xf, 0x2, [{0x1}], "f36c"}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x4}, {0x1, 0x1}, {0xe, 0x1}, {0x7, 0x5}, {0x8, 0x3}, {0x10, 0x5}]}, @union={0x8, 0x5, 0x0, 0x5, 0x1, 0x3, [{0x5, 0x5, 0x8001}, {0xc, 0x2, 0x5}, {0x3, 0x2, 0x43f}, {0xa, 0x0, 0x5}, {0xa, 0x4, 0x6}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x3}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @volatile={0xa, 0x0, 0x0, 0x9, 0x5}, @datasec={0xc, 0x3, 0x0, 0xf, 0x3, [{0x5, 0x10000}, {0x1, 0x504, 0x8}, {0x4, 0x8, 0x101}], "dc16c0"}]}, {0x0, [0x0, 0x0, 0x30, 0x1e]}}, &(0x7f0000000400)=""/220, 0x122, 0xdc}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x81, '\x00', 0x0, r5, 0x0, 0x3, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000380000000c000000040000000e00000000000006040000000c0000003f0000000700000000000000050000002000000000000000d00a000003000000c1ffffff00005f00f7232abd9aae13118731fad265155ab20ca65f68fa61c047e7be6a3a151b492423464cf730dd39524268c5af0492a5aba0bdb4a2"], 0x0, 0x28}, 0x20) 00:13:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f0000002180)={0x60, 0x0, r1, {{0xfefd, 0x4, 0x6, 0x8e, 0x7, 0x69, 0x3, 0xfffffffd}}}, 0x60) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r2, &(0x7f0000004240)={0xa0, 0x0, r1, {{0x5, 0x2, 0x1, 0x4, 0x6, 0xdf93091f, {0x3, 0x2, 0x8, 0x8, 0xe23f, 0xb488, 0x9, 0xe7, 0x4, 0x6000, 0xdf8, 0x0, r3, 0x3, 0x79e8bedf}}, {0x0, 0x6}}}, 0xa0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:04 executing program 1: socket(0x2c, 0x3, 0x0) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x28, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f0000002180)={0x60, 0x0, r1, {{0xfefd, 0x4, 0x6, 0x8e, 0x7, 0x69, 0x3, 0xfffffffd}}}, 0x60) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r2, &(0x7f0000004240)={0xa0, 0x0, r1, {{0x5, 0x2, 0x1, 0x4, 0x6, 0xdf93091f, {0x3, 0x2, 0x8, 0x8, 0xe23f, 0xb488, 0x9, 0xe7, 0x4, 0x6000, 0xdf8, 0x0, r3, 0x3, 0x79e8bedf}}, {0x0, 0x6}}}, 0xa0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r0, &(0x7f0000002180)={0x60, 0x0, r1, {{0xfefd, 0x4, 0x6, 0x8e, 0x7, 0x69, 0x3, 0xfffffffd}}}, 0x60) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r2, &(0x7f0000004240)={0xa0, 0x0, r1, {{0x5, 0x2, 0x1, 0x4, 0x6, 0xdf93091f, {0x3, 0x2, 0x8, 0x8, 0xe23f, 0xb488, 0x9, 0xe7, 0x4, 0x6000, 0xdf8, 0x0, r3, 0x3, 0x79e8bedf}}, {0x0, 0x6}}}, 0xa0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30}, 0x20) 00:13:04 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', r1, r0, 0x1, 0x2, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', r1, r0, 0x2, 0x2, 0x1}, 0x48) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x28, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x3, 0x0) 00:13:04 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f0000002180)={0x60, 0x0, r1, {{0xfefd, 0x4, 0x6, 0x8e, 0x7, 0x69, 0x3, 0xfffffffd}}}, 0x60) (async) write$FUSE_STATFS(r0, &(0x7f0000002180)={0x60, 0x0, r1, {{0xfefd, 0x4, 0x6, 0x8e, 0x7, 0x69, 0x3, 0xfffffffd}}}, 0x60) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r2, &(0x7f0000004240)={0xa0, 0x0, r1, {{0x5, 0x2, 0x1, 0x4, 0x6, 0xdf93091f, {0x3, 0x2, 0x8, 0x8, 0xe23f, 0xb488, 0x9, 0xe7, 0x4, 0x6000, 0xdf8, 0x0, r3, 0x3, 0x79e8bedf}}, {0x0, 0x6}}}, 0xa0) (async) write$FUSE_CREATE_OPEN(r2, &(0x7f0000004240)={0xa0, 0x0, r1, {{0x5, 0x2, 0x1, 0x4, 0x6, 0xdf93091f, {0x3, 0x2, 0x8, 0x8, 0xe23f, 0xb488, 0x9, 0xe7, 0x4, 0x6000, 0xdf8, 0x0, r3, 0x3, 0x79e8bedf}}, {0x0, 0x6}}}, 0xa0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:04 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', r1, r0, 0x1, 0x2, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', r1, r0, 0x2, 0x2, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0), 0x4) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', r1, r0, 0x1, 0x2, 0x4}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', r1, r0, 0x2, 0x2, 0x1}, 0x48) (async) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:04 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000080), &(0x7f0000000140)=r2}, 0x20) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) write$FUSE_STATFS(r0, &(0x7f0000000000)={0x60, 0xffffffffffffffda, r1, {{0x7, 0x2, 0x29f, 0x6f, 0x8000, 0xffffffff, 0x101, 0xfffffffd}}}, 0x60) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x28, 0x18, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x3, 0x0) 00:13:04 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x5, '\x00', r1, r0, 0x1, 0x2, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', r1, r0, 0x2, 0x2, 0x1}, 0x48) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 32) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000080), &(0x7f0000000140)=r2}, 0x20) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) (async) write$FUSE_STATFS(r0, &(0x7f0000000000)={0x60, 0xffffffffffffffda, r1, {{0x7, 0x2, 0x29f, 0x6f, 0x8000, 0xffffffff, 0x101, 0xfffffffd}}}, 0x60) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x3, 0x0) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0002e70b0000000400800004000038faa88c00"], 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x3, 0x0) 00:13:04 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740)={0x2020, 0x0, 0x0}, 0x2020) (async) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000080), &(0x7f0000000140)=r2}, 0x20) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002880)={0x20, 0x0, r1, {0x0, 0x2}}, 0x20) write$FUSE_STATFS(r0, &(0x7f0000000000)={0x60, 0xffffffffffffffda, r1, {{0x7, 0x2, 0x29f, 0x6f, 0x8000, 0xffffffff, 0x101, 0xfffffffd}}}, 0x60) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0002e70b0000000400800004000038faa88c00"], 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0002e70b0000000400800004000038faa88c00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) 00:13:04 executing program 1: socket(0x0, 0x3, 0x0) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x1b, 0x18, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0002e70b0000000400800004000038faa88c00"], 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x1b, 0x18, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB], 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4c000) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0x4}]}, 0x18}}, 0x80) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:04 executing program 1: socket(0x0, 0x3, 0x0) 00:13:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x1}}, @const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x61, 0x61, 0x5f]}}, 0x0, 0x41}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f00000002c0), 0x27, 0x0, 0x1, 0x5}, 0x20) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2}, [@alu={0x4, 0x1, 0xb, 0x3, 0x2, 0x100, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)=[{0x3, 0x2, 0x10, 0x7}], 0x10, 0xe4e}, 0x90) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x1b, 0x18, 0x1}, 0x20) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x1}}, @const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x61, 0x61, 0x5f]}}, 0x0, 0x41}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f00000002c0), 0x27, 0x0, 0x1, 0x5}, 0x20) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2}, [@alu={0x4, 0x1, 0xb, 0x3, 0x2, 0x100, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)=[{0x3, 0x2, 0x10, 0x7}], 0x10, 0xe4e}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x1}}, @const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x61, 0x61, 0x5f]}}, 0x0, 0x41}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f00000002c0), 0x27, 0x0, 0x1, 0x5}, 0x20) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2}, [@alu={0x4, 0x1, 0xb, 0x3, 0x2, 0x100, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)=[{0x3, 0x2, 0x10, 0x7}], 0x10, 0xe4e}, 0x90) (async) 00:13:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB], 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4c000) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0x4}]}, 0x18}}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB], 0x14}}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (async) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4c000) (async) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0x4}]}, 0x18}}, 0x80) (async) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x27, 0x18, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x1}}, @const={0x6, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x61, 0x61, 0x5f]}}, 0x0, 0x41}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x61]}}, &(0x7f00000002c0), 0x27, 0x0, 0x1, 0x5}, 0x20) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2}, [@alu={0x4, 0x1, 0xb, 0x3, 0x2, 0x100, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x3, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)=[{0x3, 0x2, 0x10, 0x7}], 0x10, 0xe4e}, 0x90) 00:13:04 executing program 1: socket(0x0, 0x3, 0x0) 00:13:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB], 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0x0) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4c000) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0x4}]}, 0x18}}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB], 0x14}}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NFC_CMD_DEP_LINK_UP(r1, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000140)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (async) sendmsg$NFC_CMD_GET_DEVICE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x4c000) (async) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000004d00)={&(0x7f0000004b80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004cc0)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) (async) sendmsg$NFC_CMD_FW_DOWNLOAD(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_FIRMWARE_NAME={0x4}]}, 0x18}}, 0x80) (async) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x27, 0x18, 0x1}, 0x20) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:13:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x5f, 0x0, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/27, 0x2a, 0x1b, 0x1, 0x100000}, 0x20) 00:13:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x27, 0x18, 0x1}, 0x20) 00:13:04 executing program 1: socket(0x2c, 0x0, 0x0) 00:13:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:13:05 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:13:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x5f, 0x0, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/27, 0x2a, 0x1b, 0x1, 0x100000}, 0x20) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:13:05 executing program 2: accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:13:05 executing program 1: socket(0x2c, 0x0, 0x0) 00:13:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x5f, 0x0, 0x30, 0x2e]}}, &(0x7f00000000c0)=""/27, 0x2a, 0x1b, 0x1, 0x100000}, 0x20) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 1: socket(0x2c, 0x0, 0x0) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:13:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x4, [@struct={0x12, 0x3, 0x0, 0x4, 0x0, 0xb64, [{0x4, 0x0, 0xffff300b}, {0x0, 0x1, 0x1f}, {0x5, 0x4, 0x7}]}, @const={0x6}, @union={0x101, 0x2, 0x0, 0x5, 0x1, 0x5, [{0x8, 0x1, 0x10001}, {0x0, 0x2, 0xffffffc0}]}, @struct={0xb, 0x4, 0x0, 0x4, 0x1, 0x4, [{0xc, 0x5, 0x2}, {0xd, 0x5, 0x101}, {0x9, 0x3, 0x40}, {0x9, 0x5, 0x5}]}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x9, 0x6}, {0x7, 0x9}, {}, {0xc, 0xfff}, {0x2, 0x5}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0xec, 0x0, 0x1, 0x2c9}, 0x20) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, 0x0, 0x1c, 0x0, 0x1}, 0x20) 00:13:05 executing program 4: syz_io_uring_setup(0x7e0c, &(0x7f0000000000)={0x0, 0xfc5a, 0x429, 0x0, 0x2ee}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = accept4$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @bcast, @null, @default, @null, @netrom, @bcast, @bcast]}, &(0x7f00000001c0)=0x48, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000200)=0x2, 0x4) syz_io_uring_submit(0x0, r0, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x1c, 0x0, @fd_index=0x5, 0x280000000000000, 0x0, 0x3}) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x4, [@struct={0x12, 0x3, 0x0, 0x4, 0x0, 0xb64, [{0x4, 0x0, 0xffff300b}, {0x0, 0x1, 0x1f}, {0x5, 0x4, 0x7}]}, @const={0x6}, @union={0x101, 0x2, 0x0, 0x5, 0x1, 0x5, [{0x8, 0x1, 0x10001}, {0x0, 0x2, 0xffffffc0}]}, @struct={0xb, 0x4, 0x0, 0x4, 0x1, 0x4, [{0xc, 0x5, 0x2}, {0xd, 0x5, 0x101}, {0x9, 0x3, 0x40}, {0x9, 0x5, 0x5}]}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x9, 0x6}, {0x7, 0x9}, {}, {0xc, 0xfff}, {0x2, 0x5}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0xec, 0x0, 0x1, 0x2c9}, 0x20) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x4, [@struct={0x12, 0x3, 0x0, 0x4, 0x0, 0xb64, [{0x4, 0x0, 0xffff300b}, {0x0, 0x1, 0x1f}, {0x5, 0x4, 0x7}]}, @const={0x6}, @union={0x101, 0x2, 0x0, 0x5, 0x1, 0x5, [{0x8, 0x1, 0x10001}, {0x0, 0x2, 0xffffffc0}]}, @struct={0xb, 0x4, 0x0, 0x4, 0x1, 0x4, [{0xc, 0x5, 0x2}, {0xd, 0x5, 0x101}, {0x9, 0x3, 0x40}, {0x9, 0x5, 0x5}]}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x9, 0x6}, {0x7, 0x9}, {}, {0xc, 0xfff}, {0x2, 0x5}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0xec, 0x0, 0x1, 0x2c9}, 0x20) [ 785.254381][ T402] nbd1: detected capacity change from 0 to 1 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x30, 0x18, 0x1}, 0x20) 00:13:05 executing program 4: syz_io_uring_setup(0x7e0c, &(0x7f0000000000)={0x0, 0xfc5a, 0x429, 0x0, 0x2ee}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = accept4$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @bcast, @null, @default, @null, @netrom, @bcast, @bcast]}, &(0x7f00000001c0)=0x48, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000200)=0x2, 0x4) syz_io_uring_submit(0x0, r0, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x1c, 0x0, @fd_index=0x5, 0x280000000000000, 0x0, 0x3}) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, &(0x7f00000000c0)=""/24, 0x2e, 0x18, 0x1}, 0x20) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:05 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x5}, 0x48) 00:13:05 executing program 4: syz_io_uring_setup(0x7e0c, &(0x7f0000000000)={0x0, 0xfc5a, 0x429, 0x0, 0x2ee}, &(0x7f0000000080), &(0x7f00000000c0)=0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) r2 = accept4$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @bcast, @null, @default, @null, @netrom, @bcast, @bcast]}, &(0x7f00000001c0)=0x48, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000200)=0x2, 0x4) syz_io_uring_submit(0x0, r0, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x1c, 0x0, @fd_index=0x5, 0x280000000000000, 0x0, 0x3}) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, &(0x7f00000000c0)=""/24, 0x2e, 0x18, 0x1}, 0x20) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30}, 0x20) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb410018000000000000000c0000000c000000040000000f0000000000000604000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x5}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x8, 0x89, 0x8000, 0x16, 0x208, 0xffffffffffffffff, 0xffffff80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x6}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x69}}, @fwd={0x7}]}, {0x0, [0x0, 0x30, 0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/113, 0x43, 0x71, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', 0x0, r1, 0x0, 0x4, 0x5}, 0x48) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, &(0x7f00000000c0)=""/24, 0x2e, 0x18, 0x1}, 0x20) 00:13:05 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x5}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x5}, 0x48) 00:13:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb410018000000000000000c0000000c000000040000000f0000000000000604000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x5}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x8, 0x89, 0x8000, 0x16, 0x208, 0xffffffffffffffff, 0xffffff80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x6}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x69}}, @fwd={0x7}]}, {0x0, [0x0, 0x30, 0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/113, 0x43, 0x71, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', 0x0, r1, 0x0, 0x4, 0x5}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb410018000000000000000c0000000c000000040000000f0000000000000604000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x5}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x8, 0x89, 0x8000, 0x16, 0x208, 0xffffffffffffffff, 0xffffff80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x6}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x69}}, @fwd={0x7}]}, {0x0, [0x0, 0x30, 0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/113, 0x43, 0x71, 0x1, 0x9}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', 0x0, r1, 0x0, 0x4, 0x5}, 0x48) (async) 00:13:05 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x5}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x3, 0x0, 0x5}, 0x48) (async) 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) [ 785.484870][ T454] nbd0: detected capacity change from 0 to 1 00:13:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, &(0x7f00000000c0)=""/24, 0x2f, 0x18, 0x1}, 0x20) 00:13:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb410018000000000000000c0000000c000000040000000f0000000000000604000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x5}, 0x20) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x8, 0x89, 0x8000, 0x16, 0x208, 0xffffffffffffffff, 0xffffff80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x6}, 0x48) (async, rerun: 64) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x69}}, @fwd={0x7}]}, {0x0, [0x0, 0x30, 0x0, 0x61, 0x5f]}}, &(0x7f0000000240)=""/113, 0x43, 0x71, 0x1, 0x9}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x2, '\x00', 0x0, r1, 0x0, 0x4, 0x5}, 0x48) 00:13:05 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000009c3d000c0000000c00000004000000e8005f"], 0x0, 0x28, 0x0, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000400)={0x0, 0x1, 0x6, @multicast}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000440)=0x100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0xc7}, @ldst={0xb180b8e6fd6d587d, 0x0, 0x2, 0x5, 0x5, 0xffffffffffffffc0, 0x4}, @generic={0x63, 0x1, 0xa, 0x3, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x8, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x9b08, 0xca, &(0x7f0000000140)=""/202, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)=[0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x4, 0x2, 0xd, 0xb}, {0x0, 0x5, 0xf, 0xa}, {0x4, 0x2, 0xc, 0x7}, {0x2, 0x5, 0xd, 0xa}, {0x4, 0x1, 0x9, 0xc}, {0x5, 0x4, 0xd, 0x9}, {0x1, 0x1, 0x8, 0x9}], 0x10, 0x7f}, 0x90) 00:13:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) [ 786.045181][T13220] block nbd1: Receive control failed (result -104) [ 786.283998][ T6138] block nbd0: Receive control failed (result -104) [ 791.544607][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 5 seconds [ 797.943308][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 10 seconds [ 801.783657][ T2224] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.785188][ T2224] ieee802154 phy1 wpan1: encryption failed: -22 [ 804.343921][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 15 seconds [ 810.743441][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 20 seconds 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000009c3d000c0000000c00000004000000e8005f"], 0x0, 0x28, 0x0, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000400)={0x0, 0x1, 0x6, @multicast}, 0x10) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000400)={0x0, 0x1, 0x6, @multicast}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000440)=0x100) (async) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000440)=0x100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0xc7}, @ldst={0xb180b8e6fd6d587d, 0x0, 0x2, 0x5, 0x5, 0xffffffffffffffc0, 0x4}, @generic={0x63, 0x1, 0xa, 0x3, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x8, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x9b08, 0xca, &(0x7f0000000140)=""/202, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)=[0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x4, 0x2, 0xd, 0xb}, {0x0, 0x5, 0xf, 0xa}, {0x4, 0x2, 0xc, 0x7}, {0x2, 0x5, 0xd, 0xa}, {0x4, 0x1, 0x9, 0xc}, {0x5, 0x4, 0xd, 0x9}, {0x1, 0x1, 0x8, 0x9}], 0x10, 0x7f}, 0x90) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000000000000200000604010000000000000000000001000000000000d22ae61d5c85ddaf344a09d6f83300005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x23b1800}}, [0x1d, 0x4, 0x212, 0x81, 0x7fffffff, 0x2, 0x800, 0x3, 0x1f, 0x7f, 0x80000000, 0x9, 0x7fff, 0x80, 0x1]}, &(0x7f0000000000)=0x100) r1 = syz_io_uring_setup(0x1ac, &(0x7f00000001c0)={0x0, 0xf954, 0x2, 0x2, 0xdf}, &(0x7f0000000240), &(0x7f0000000280)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x4008, r1}, 0x18) 00:13:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000000000000200000604010000000000000000000001000000000000d22ae61d5c85ddaf344a09d6f83300005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x23b1800}}, [0x1d, 0x4, 0x212, 0x81, 0x7fffffff, 0x2, 0x800, 0x3, 0x1f, 0x7f, 0x80000000, 0x9, 0x7fff, 0x80, 0x1]}, &(0x7f0000000000)=0x100) (async) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x23b1800}}, [0x1d, 0x4, 0x212, 0x81, 0x7fffffff, 0x2, 0x800, 0x3, 0x1f, 0x7f, 0x80000000, 0x9, 0x7fff, 0x80, 0x1]}, &(0x7f0000000000)=0x100) r1 = syz_io_uring_setup(0x1ac, &(0x7f00000001c0)={0x0, 0xf954, 0x2, 0x2, 0xdf}, &(0x7f0000000240), &(0x7f0000000280)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x4008, r1}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x4008, r1}, 0x18) 00:13:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000009c3d000c0000000c00000004000000e8005f"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000400)={0x0, 0x1, 0x6, @multicast}, 0x10) (async) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000440)=0x100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xe, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0xc7}, @ldst={0xb180b8e6fd6d587d, 0x0, 0x2, 0x5, 0x5, 0xffffffffffffffc0, 0x4}, @generic={0x63, 0x1, 0xa, 0x3, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x8, 0x1, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x9b08, 0xca, &(0x7f0000000140)=""/202, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000280)=[0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x4, 0x2, 0xd, 0xb}, {0x0, 0x5, 0xf, 0xa}, {0x4, 0x2, 0xc, 0x7}, {0x2, 0x5, 0xd, 0xa}, {0x4, 0x1, 0x9, 0xc}, {0x5, 0x4, 0xd, 0x9}, {0x1, 0x1, 0x8, 0x9}], 0x10, 0x7f}, 0x90) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004000000000000000200000604010000000000000000000001000000000000d22ae61d5c85ddaf344a09d6f83300005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x23b1800}}, [0x1d, 0x4, 0x212, 0x81, 0x7fffffff, 0x2, 0x800, 0x3, 0x1f, 0x7f, 0x80000000, 0x9, 0x7fff, 0x80, 0x1]}, &(0x7f0000000000)=0x100) (async) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x23b1800}}, [0x1d, 0x4, 0x212, 0x81, 0x7fffffff, 0x2, 0x800, 0x3, 0x1f, 0x7f, 0x80000000, 0x9, 0x7fff, 0x80, 0x1]}, &(0x7f0000000000)=0x100) syz_io_uring_setup(0x1ac, &(0x7f00000001c0)={0x0, 0xf954, 0x2, 0x2, 0xdf}, &(0x7f0000000240), &(0x7f0000000280)) (async) r1 = syz_io_uring_setup(0x1ac, &(0x7f00000001c0)={0x0, 0xf954, 0x2, 0x2, 0xdf}, &(0x7f0000000240), &(0x7f0000000280)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x4008, r1}, 0x18) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) socket$inet6_sctp(0xa, 0x5, 0x84) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) socket$inet6_sctp(0xa, 0x5, 0x84) 00:13:35 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c220000040000000c00a457abd4a8acf184ec930c0b000002000006040000000200000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async, rerun: 32) socket$inet6_sctp(0xa, 0x5, 0x84) (rerun: 32) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c220000040000000c00a457abd4a8acf184ec930c0b000002000006040000000200000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x0]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c220000040000000c00a457abd4a8acf184ec930c0b000002000006040000000200000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x13, [@enum={0x2, 0x0, 0x0, 0x6, 0x4, [{0x4, 0x8}, {0xd, 0x4}, {0x10, 0x20}, {0xb, 0x1}, {0x1, 0x6b20}, {0x2, 0x2}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@enum={0x1, 0x2, 0x0, 0x6, 0x4, [{0x2, 0xfffffffe}, {0x1, 0xfffffffd}]}]}}, &(0x7f0000000000)=""/17, 0x36, 0x11, 0x1}, 0x20) socketpair(0x2b, 0x800, 0x2e, &(0x7f00000000c0)) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x13, [@enum={0x2, 0x0, 0x0, 0x6, 0x4, [{0x4, 0x8}, {0xd, 0x4}, {0x10, 0x20}, {0xb, 0x1}, {0x1, 0x6b20}, {0x2, 0x2}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@enum={0x1, 0x2, 0x0, 0x6, 0x4, [{0x2, 0xfffffffe}, {0x1, 0xfffffffd}]}]}}, &(0x7f0000000000)=""/17, 0x36, 0x11, 0x1}, 0x20) socketpair(0x2b, 0x800, 0x2e, &(0x7f00000000c0)) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x13, [@enum={0x2, 0x0, 0x0, 0x6, 0x4, [{0x4, 0x8}, {0xd, 0x4}, {0x10, 0x20}, {0xb, 0x1}, {0x1, 0x6b20}, {0x2, 0x2}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@enum={0x1, 0x2, 0x0, 0x6, 0x4, [{0x2, 0xfffffffe}, {0x1, 0xfffffffd}]}]}}, &(0x7f0000000000)=""/17, 0x36, 0x11, 0x1}, 0x20) (async) socketpair(0x2b, 0x800, 0x2e, &(0x7f00000000c0)) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/239, 0xef, 0x0, &(0x7f0000000240)=""/132, 0x84}}, 0x10) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_SE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0xa3d, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x400000d0}, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, 0x0, 0x1b, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_SE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0xa3d, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x400000d0}, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/239, 0xef, 0x0, &(0x7f0000000240)=""/132, 0x84}}, 0x10) (rerun: 64) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, 0x0, 0x1b, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/239, 0xef, 0x0, &(0x7f0000000240)=""/132, 0x84}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x20, &(0x7f0000000000)={&(0x7f0000000140)=""/239, 0xef, 0x0, &(0x7f0000000240)=""/132, 0x84}}, 0x10) (async) 00:13:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_SE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0xa3d, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x400000d0}, 0x1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, 0x0, 0x1b, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x30, 0x0, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0x0, 0x0, {0x0, 0xf}}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0xff46}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61, 0x5f]}}, 0x0, 0x30}, 0x20) 00:13:35 executing program 2: bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x1, 0x6, @random="3581d8d5a8dc"}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x66a, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x100, 0x3}, 0x48) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:13:35 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0x0, 0x0, {0x0, 0xf}}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) (async) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0xff46}, 0x90) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) 00:13:35 executing program 2: bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x1, 0x6, @random="3581d8d5a8dc"}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x66a, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x100, 0x3}, 0x48) 00:13:35 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0x0, 0x0, {0x0, 0xf}}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) (async) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0xff46}, 0x90) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0xff46}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x61]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2dd2b488a7ab553eff85de57a60952366c5308c6377bfac909906d3d73f442fab4d83b615e318c07c234fd567a47"], 0x0, 0x29}, 0x20) 00:13:35 executing program 2: bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x15, 0x0, 0x1, 0x1, 0x6, @random="3581d8d5a8dc"}, 0x14) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x66a, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x100, 0x3}, 0x48) 00:13:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000001c000000040000000000000002000006040000000200e91df557f180bf3b98000000000000970f75017ac0d30100000000000000005f5f0000000000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000002200000000000004000000005f5f007eaf7c692522a74c40a7974fe9060d0bf208c2239061a1a1d2a91190e208db488e503d8617ea714624fab6e8854b822ec02fcb5b67315a4054f96ee0632c90d0fc42de09817da42afa67fd31c3bc8a1f84be3de06dfac71937f1773938dbe88b2be4402b0157738b9a6d76c52b57d5fff9a3404adf43144efbea4e6a1b0e2b19"], 0x0, 0x1c, 0x0, 0x1}, 0x20) accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@rose, @bcast, @default, @null, @null, @default, @rose, @null]}, &(0x7f0000000000)=0x48) 00:13:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x61]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000001c000000040000000000000002000006040000000200e91df557f180bf3b98000000000000970f75017ac0d30100000000000000005f5f0000000000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000001c000000040000000000000002000006040000000200e91df557f180bf3b98000000000000970f75017ac0d30100000000000000005f5f0000000000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000002200000000000004000000005f5f007eaf7c692522a74c40a7974fe9060d0bf208c2239061a1a1d2a91190e208db488e503d8617ea714624fab6e8854b822ec02fcb5b67315a4054f96ee0632c90d0fc42de09817da42afa67fd31c3bc8a1f84be3de06dfac71937f1773938dbe88b2be4402b0157738b9a6d76c52b57d5fff9a3404adf43144efbea4e6a1b0e2b19"], 0x0, 0x1c, 0x0, 0x1}, 0x20) accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@rose, @bcast, @default, @null, @null, @default, @rose, @null]}, &(0x7f0000000000)=0x48) (async) accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@rose, @bcast, @default, @null, @null, @default, @rose, @null]}, &(0x7f0000000000)=0x48) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000001c000000040000000000000002000006040000000200e91df557f180bf3b98000000000000970f75017ac0d30100000000000000005f5f0000000000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000002200000000000004000000005f5f007eaf7c692522a74c40a7974fe9060d0bf208c2239061a1a1d2a91190e208db488e503d8617ea714624fab6e8854b822ec02fcb5b67315a4054f96ee0632c90d0fc42de09817da42afa67fd31c3bc8a1f84be3de06dfac71937f1773938dbe88b2be4402b0157738b9a6d76c52b57d5fff9a3404adf43144efbea4e6a1b0e2b19"], 0x0, 0x1c, 0x0, 0x1}, 0x20) (async) accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@rose, @bcast, @default, @null, @null, @default, @rose, @null]}, &(0x7f0000000000)=0x48) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x29}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb1f000000001c000001040000000000002566f2fe0900000000021300007a14b69dc2320b0a00"/49], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb1f000000001c000001040000000000002566f2fe0900000000021300007a14b69dc2320b0a00"/49], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb1f000000001c000001040000000000002566f2fe0900000000021300007a14b69dc2320b0a00"/49], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb1f000000001c000001040000000000002566f2fe0900000000021300007a14b69dc2320b0a00"/49], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x0, 0x29}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getgid() setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x3e, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @local}}, 0x1, 0xff}, &(0x7f0000000240)=0x90) 00:13:36 executing program 2: ioctl$NBD_PRINT_DEBUG(0xffffffffffffffff, 0xab06) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x0, 0x28, 0x0, 0x200001, 0xfffffffe}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:36 executing program 2: ioctl$NBD_PRINT_DEBUG(0xffffffffffffffff, 0xab06) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x0, 0x28, 0x0, 0x200001, 0xfffffffe}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x0, 0x28, 0x0, 0x200001, 0xfffffffe}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x61]}}, 0x0, 0x2f}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x0, 0x29}, 0x20) 00:13:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getgid() setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x3e, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @local}}, 0x1, 0xff}, &(0x7f0000000240)=0x90) socket$inet6_sctp(0xa, 0x0, 0x84) (async) getgid() (async) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x3e, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) (async) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @local}}, 0x1, 0xff}, &(0x7f0000000240)=0x90) (async) 00:13:36 executing program 2: ioctl$NBD_PRINT_DEBUG(0xffffffffffffffff, 0xab06) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x0, 0x28, 0x0, 0x200001, 0xfffffffe}, 0x20) (rerun: 64) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x0]}}, 0x0, 0x2f, 0x0, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) read$midi(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:36 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getgid() setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x3e, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x3e, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @local}}, 0x1, 0xff}, &(0x7f0000000240)=0x90) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) read$midi(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) read$midi(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30000c8e556f2d"], 0x0, 0x29}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000feffffff1e00000600000000006d9894a25f5f00"], &(0x7f0000000000)=""/41, 0x38, 0x29, 0x1, 0xffffffff}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f00000000c0)=""/24, 0x1c, 0x18, 0x1}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000feffffff1e00000600000000006d9894a25f5f00"], &(0x7f0000000000)=""/41, 0x38, 0x29, 0x1, 0xffffffff}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0x1, 0x4}, {0xa, 0x1700}, {0xe, 0x9}, {0xe, 0x7ff}, {0x5, 0xfffffffb}]}]}, {0x0, [0x0, 0x5f, 0x61]}}, 0x0, 0x51, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4a, 0x4a, 0xa, [@datasec={0xf, 0x3, 0x0, 0xf, 0x2, [{0x4, 0x1ff, 0x1ff}, {0x1, 0xffffffff, 0xa5}, {0x4, 0x5bad, 0x7}], "4eeb"}, @union={0x10, 0x1, 0x0, 0x5, 0x1, 0x11, [{0xe, 0x0, 0x1}]}]}, {0x0, [0x5f, 0x5f, 0x30, 0x61, 0x61, 0x5f, 0x30, 0x0]}}, &(0x7f00000001c0)=""/215, 0x6e, 0xd7, 0x1, 0x7ff}, 0x20) write$nbd(0xffffffffffffffff, &(0x7f0000000080)={0x67446698, 0x0, 0x4, 0x4, 0x1, "d224edabec3a50f2e7a11fbd1fb2988dff58b411090ae305e779bd84cc668bcf394fa6df8b6a957f3c56cfeb3de406e8663908578c99e6bd952931b67cf428055ef82a61e8a29b757519579b7f4fe0b0c12edb6b"}, 0x64) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0x1, 0x4}, {0xa, 0x1700}, {0xe, 0x9}, {0xe, 0x7ff}, {0x5, 0xfffffffb}]}]}, {0x0, [0x0, 0x5f, 0x61]}}, 0x0, 0x51, 0x0, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4a, 0x4a, 0xa, [@datasec={0xf, 0x3, 0x0, 0xf, 0x2, [{0x4, 0x1ff, 0x1ff}, {0x1, 0xffffffff, 0xa5}, {0x4, 0x5bad, 0x7}], "4eeb"}, @union={0x10, 0x1, 0x0, 0x5, 0x1, 0x11, [{0xe, 0x0, 0x1}]}]}, {0x0, [0x5f, 0x5f, 0x30, 0x61, 0x61, 0x5f, 0x30, 0x0]}}, &(0x7f00000001c0)=""/215, 0x6e, 0xd7, 0x1, 0x7ff}, 0x20) (async) write$nbd(0xffffffffffffffff, &(0x7f0000000080)={0x67446698, 0x0, 0x4, 0x4, 0x1, "d224edabec3a50f2e7a11fbd1fb2988dff58b411090ae305e779bd84cc668bcf394fa6df8b6a957f3c56cfeb3de406e8663908578c99e6bd952931b67cf428055ef82a61e8a29b757519579b7f4fe0b0c12edb6b"}, 0x64) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000feffffff1e00000600000000006d9894a25f5f00"], &(0x7f0000000000)=""/41, 0x38, 0x29, 0x1, 0xffffffff}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], 0x0, 0x29}, 0x20) 00:13:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0x1, 0x4}, {0xa, 0x1700}, {0xe, 0x9}, {0xe, 0x7ff}, {0x5, 0xfffffffb}]}]}, {0x0, [0x0, 0x5f, 0x61]}}, 0x0, 0x51, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4a, 0x4a, 0xa, [@datasec={0xf, 0x3, 0x0, 0xf, 0x2, [{0x4, 0x1ff, 0x1ff}, {0x1, 0xffffffff, 0xa5}, {0x4, 0x5bad, 0x7}], "4eeb"}, @union={0x10, 0x1, 0x0, 0x5, 0x1, 0x11, [{0xe, 0x0, 0x1}]}]}, {0x0, [0x5f, 0x5f, 0x30, 0x61, 0x61, 0x5f, 0x30, 0x0]}}, &(0x7f00000001c0)=""/215, 0x6e, 0xd7, 0x1, 0x7ff}, 0x20) (async) write$nbd(0xffffffffffffffff, &(0x7f0000000080)={0x67446698, 0x0, 0x4, 0x4, 0x1, "d224edabec3a50f2e7a11fbd1fb2988dff58b411090ae305e779bd84cc668bcf394fa6df8b6a957f3c56cfeb3de406e8663908578c99e6bd952931b67cf428055ef82a61e8a29b757519579b7f4fe0b0c12edb6b"}, 0x64) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x4, 0x4) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) (async) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x4, 0x4) 00:13:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x7, 0x9, 0xfffffff9, 0x3, 0x80000000, 0x1, 0x3}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile={0x4, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x4, 0x4) 00:13:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x7, 0x9, 0xfffffff9, 0x3, 0x80000000, 0x1, 0x3}, 0x1c) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile={0x4, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000"], 0x0, 0x29}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'a', ' *:* ', 'm\x00'}, 0x8) 00:13:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x7, 0x9, 0xfffffff9, 0x3, 0x80000000, 0x1, 0x3}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile={0x4, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000"], 0x0, 0x29}, 0x20) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'a', ' *:* ', 'm\x00'}, 0x8) 00:13:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f00000000c0)=""/24, 0x0, 0x18, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000240)=""/165, 0xa5, 0x0, &(0x7f0000000000)=""/1, 0x1}}, 0x10) 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'a', ' *:* ', 'm\x00'}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'a', ' *:* ', 'm\x00'}, 0x8) (async) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000"], 0x0, 0x29}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000240)=""/165, 0xa5, 0x0, &(0x7f0000000000)=""/1, 0x1}}, 0x10) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f00000000c0)=""/24, 0x1b, 0x18, 0x1}, 0x20) [ 816.821694][T13220] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 816.824797][T13220] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 816.827016][T13220] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 816.829423][T13220] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 816.832275][T13220] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 816.834995][T13220] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000050000000200000000000006040000"], 0x0, 0x29}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/24, 0x1a, 0x18, 0x1}, 0x20) 00:13:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000240)=""/165, 0xa5, 0x0, &(0x7f0000000000)=""/1, 0x1}}, 0x10) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000050000000200000000000006040000"], 0x0, 0x29}, 0x20) 00:13:36 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x80, 0x2, 0x1, 0x5, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x700, 0x7800, 0x6, 0x1}}) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_io_uring_setup(0x7606, &(0x7f0000000040)={0x0, 0x7679, 0x400, 0x1, 0x313, 0x0, r0}, &(0x7f00000000c0), &(0x7f0000000140)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x8}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:13:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 816.976935][T13220] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 00:13:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x8, [@func={0x1, 0x0, 0x0, 0xc, 0x3}, @func={0x2, 0x0, 0x0, 0xc, 0x5}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x14, 0x0, 0x10, 0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x9, 0x3}, {0x5}, {0x1, 0x2}, {0x8, 0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e, 0x1e]}}, &(0x7f0000000040)=""/111, 0x88, 0x6f, 0x0, 0x9}, 0x20) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = getgid() write$FUSE_ENTRY(r0, &(0x7f00000002c0)={0x90, 0x0, 0x0, {0x2, 0x3, 0x1, 0xffffffffffffff81, 0x5, 0xfff, {0x1, 0x4, 0x1, 0x3, 0x7, 0x3ff, 0x5, 0xdf76, 0x8, 0x1000, 0x92e, 0xffffffffffffffff, r1, 0x80000001, 0x64a}}}, 0x90) 00:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000050000000200000000000006040000"], 0x0, 0x29}, 0x20) [ 816.991020][T13220] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 816.993528][T13220] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 816.996243][T13220] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 816.998609][T13220] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 817.000539][T13220] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 817.057977][ T799] chnl_net:caif_netlink_parms(): no params data found [ 817.122828][ T799] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.124792][ T799] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.126724][ T799] bridge_slave_0: entered allmulticast mode [ 817.128955][ T799] bridge_slave_0: entered promiscuous mode [ 817.131956][ T799] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.134435][ T799] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.136318][ T799] bridge_slave_1: entered allmulticast mode [ 817.138497][ T799] bridge_slave_1: entered promiscuous mode [ 817.154287][ T823] chnl_net:caif_netlink_parms(): no params data found [ 817.166635][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 25 seconds [ 817.168024][ T799] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 817.179611][ T799] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 817.204802][ T799] team0: Port device team_slave_0 added [ 817.206482][ T823] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.208299][ T823] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.210239][ T823] bridge_slave_0: entered allmulticast mode [ 817.212488][ T823] bridge_slave_0: entered promiscuous mode [ 817.220379][ T799] team0: Port device team_slave_1 added [ 817.221942][ T823] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.224091][ T823] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.225921][ T823] bridge_slave_1: entered allmulticast mode [ 817.228096][ T823] bridge_slave_1: entered promiscuous mode [ 817.251427][ T823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 817.254430][ T799] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 817.256245][ T799] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 817.262827][ T799] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 817.268067][ T799] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 817.269715][ T799] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 817.275758][ T799] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 817.280975][ T823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 817.301992][ T823] team0: Port device team_slave_0 added [ 817.306693][ T823] team0: Port device team_slave_1 added [ 817.365396][ T799] hsr_slave_0: entered promiscuous mode [ 817.403417][ T799] hsr_slave_1: entered promiscuous mode [ 817.443234][ T799] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 817.445104][ T799] Cannot create hsr debugfs directory [ 817.458965][ T823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 817.460570][ T823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 817.466746][ T823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 817.470317][ T823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 817.471860][ T823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 817.479052][ T823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 817.555194][ T823] hsr_slave_0: entered promiscuous mode [ 817.603974][ T823] hsr_slave_1: entered promiscuous mode [ 817.643201][ T823] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 817.645047][ T823] Cannot create hsr debugfs directory [ 817.684710][ T799] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 817.738184][ T799] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 817.812857][ T799] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 817.883673][ T799] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.051136][ T823] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.112231][ T823] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.176975][ T823] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.241715][ T823] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.419650][ T823] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 818.444599][ T823] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 818.485569][ T823] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 818.525697][ T823] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 818.592490][ T799] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 818.646147][ T799] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 818.694657][ T799] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 818.735780][ T799] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 818.818798][ T823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 818.828390][ T823] 8021q: adding VLAN 0 to HW filter on device team0 [ 818.838140][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.839769][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 818.842441][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.844611][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 818.888215][ T799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 818.897460][ T799] 8021q: adding VLAN 0 to HW filter on device team0 [ 818.901503][ T6259] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.903247][ T6259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 818.914281][T13220] Bluetooth: hci6: command 0x0409 tx timeout [ 818.919531][ T6259] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.921208][ T6259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 818.964966][ T823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.985805][ T823] veth0_vlan: entered promiscuous mode [ 818.990533][ T823] veth1_vlan: entered promiscuous mode [ 819.012988][ T823] veth0_macvtap: entered promiscuous mode [ 819.018219][ T823] veth1_macvtap: entered promiscuous mode [ 819.030576][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.034628][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.036839][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.039255][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.041448][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.044762][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.047090][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.049414][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.051618][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.054555][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.056801][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.059144][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.062422][ T823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 819.064525][T13220] Bluetooth: hci7: command 0x0409 tx timeout [ 819.069861][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.072247][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.074797][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.076996][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.079319][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.081589][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.084106][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.086652][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.088867][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.091340][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.093904][ T823] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.096401][ T823] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.099530][ T823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 819.104862][ T823] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.106970][ T823] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.108970][ T823] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.110974][ T823] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.117458][ T799] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 819.163492][T29055] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 819.165363][T29055] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 819.183501][ T6188] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 819.185338][ T6188] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 819.191600][ T799] veth0_vlan: entered promiscuous mode [ 819.197380][ T799] veth1_vlan: entered promiscuous mode [ 819.214193][ T799] veth0_macvtap: entered promiscuous mode [ 819.217771][ T799] veth1_macvtap: entered promiscuous mode [ 819.225780][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.228143][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.230365][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.232748][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.235616][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.238000][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.240165][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.242484][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.244789][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.247253][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.250519][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.252916][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.258377][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.260798][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.264983][ T799] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 819.270889][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.273749][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.276152][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.278618][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.280963][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.283989][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.286287][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.288881][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.291181][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.294204][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.296385][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.298588][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.300826][ T799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.303896][ T799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.307242][ T799] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 819.312317][ T799] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.315851][ T799] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.317983][ T799] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.320052][ T799] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.365014][T29055] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 819.366890][T29055] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 819.380411][T29055] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 819.382319][T29055] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 820.983170][T13220] Bluetooth: hci6: command 0x041b tx timeout [ 821.153173][T13220] Bluetooth: hci7: command 0x041b tx timeout [ 823.063274][T13220] Bluetooth: hci6: command 0x040f tx timeout [ 823.223385][T13220] Bluetooth: hci7: command 0x040f tx timeout [ 823.543685][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 30 seconds [ 825.143283][T13220] Bluetooth: hci6: command 0x0419 tx timeout [ 825.303435][T13220] Bluetooth: hci7: command 0x0419 tx timeout [ 829.943579][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 35 seconds [ 836.343314][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 40 seconds [ 842.744874][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 45 seconds [ 846.457071][ T5720] udevd[5720]: worker [31971] /devices/virtual/block/nbd1 is taking a long time [ 846.460750][ T5720] udevd[5720]: worker [464] /devices/virtual/block/nbd0 is taking a long time [ 849.146342][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 50 seconds 00:14:09 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x80, 0x2, 0x1, 0x5, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x700, 0x7800, 0x6, 0x1}}) (async, rerun: 64) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_io_uring_setup(0x7606, &(0x7f0000000040)={0x0, 0x7679, 0x400, 0x1, 0x313, 0x0, r0}, &(0x7f00000000c0), &(0x7f0000000140)) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x8}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (rerun: 64) 00:14:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:14:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:14:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x8, [@func={0x1, 0x0, 0x0, 0xc, 0x3}, @func={0x2, 0x0, 0x0, 0xc, 0x5}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x14, 0x0, 0x10, 0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x9, 0x3}, {0x5}, {0x1, 0x2}, {0x8, 0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e, 0x1e]}}, &(0x7f0000000040)=""/111, 0x88, 0x6f, 0x0, 0x9}, 0x20) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = getgid() write$FUSE_ENTRY(r0, &(0x7f00000002c0)={0x90, 0x0, 0x0, {0x2, 0x3, 0x1, 0xffffffffffffff81, 0x5, 0xfff, {0x1, 0x4, 0x1, 0x3, 0x7, 0x3ff, 0x5, 0xdf76, 0x8, 0x1000, 0x92e, 0xffffffffffffffff, r1, 0x80000001, 0x64a}}}, 0x90) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f3000"], 0x0, 0x29}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000020000000000000604000000"], 0x0, 0x29}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000020000000000000604000000"], 0x0, 0x29}, 0x20) 00:14:09 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x80, 0x2, 0x1, 0x5, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x700, 0x7800, 0x6, 0x1}}) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_io_uring_setup(0x7606, &(0x7f0000000040)={0x0, 0x7679, 0x400, 0x1, 0x313, 0x0, r0}, &(0x7f00000000c0), &(0x7f0000000140)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x8}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl1\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x2f, 0x80, 0x2, 0x1, 0x5, @remote, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x700, 0x7800, 0x6, 0x1}}) (async) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) (async) syz_io_uring_setup(0x7606, &(0x7f0000000040)={0x0, 0x7679, 0x400, 0x1, 0x313, 0x0, r0}, &(0x7f00000000c0), &(0x7f0000000140)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x8}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) (async) 00:14:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x8, [@func={0x1, 0x0, 0x0, 0xc, 0x3}, @func={0x2, 0x0, 0x0, 0xc, 0x5}, @const={0x8, 0x0, 0x0, 0xa, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x14, 0x0, 0x10, 0x1}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x9, 0x3}, {0x5}, {0x1, 0x2}, {0x8, 0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x2e, 0x1e]}}, &(0x7f0000000040)=""/111, 0x88, 0x6f, 0x0, 0x9}, 0x20) (rerun: 64) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = getgid() write$FUSE_ENTRY(r0, &(0x7f00000002c0)={0x90, 0x0, 0x0, {0x2, 0x3, 0x1, 0xffffffffffffff81, 0x5, 0xfff, {0x1, 0x4, 0x1, 0x3, 0x7, 0x3ff, 0x5, 0xdf76, 0x8, 0x1000, 0x92e, 0xffffffffffffffff, r1, 0x80000001, 0x64a}}}, 0x90) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000020000000000000604000000"], 0x0, 0x29}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/24, 0x1a, 0x18}, 0x20) 00:14:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9f001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) setsockopt$packet_buf(r2, 0x107, 0x4, &(0x7f0000000300)="f3ab6df6238da9a3b9164ac47ac3582573e15c91", 0x14) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000002640), 0x4) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xf, 0x5, 0x7, 0xbb, 0x8, r1, 0x1ff, '\x00', r4, r5, 0x2, 0x4, 0x4}, 0x48) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f"], 0x0, 0x29}, 0x20) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x56, 0x56, 0x3, [@datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x3, 0x2, 0x800}, {0x1, 0x8, 0x81}, {0x4, 0x5}, {0x5, 0x3ff, 0x5}], "2e17"}, @fwd={0x3}, @func={0x9, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/42, 0x73, 0x2a, 0x0, 0xfa2a}, 0x20) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f"], 0x0, 0x29}, 0x20) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x56, 0x56, 0x3, [@datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x3, 0x2, 0x800}, {0x1, 0x8, 0x81}, {0x4, 0x5}, {0x5, 0x3ff, 0x5}], "2e17"}, @fwd={0x3}, @func={0x9, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/42, 0x73, 0x2a, 0x0, 0xfa2a}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/24, 0x1a, 0x18}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/24, 0x1a, 0x18}, 0x20) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) (rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x56, 0x56, 0x3, [@datasec={0x6, 0x4, 0x0, 0xf, 0x2, [{0x3, 0x2, 0x800}, {0x1, 0x8, 0x81}, {0x4, 0x5}, {0x5, 0x3ff, 0x5}], "2e17"}, @fwd={0x3}, @func={0x9, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000000)=""/42, 0x73, 0x2a, 0x0, 0xfa2a}, 0x20) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f"], 0x0, 0x29}, 0x20) 00:14:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9f001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) setsockopt$packet_buf(r2, 0x107, 0x4, &(0x7f0000000300)="f3ab6df6238da9a3b9164ac47ac3582573e15c91", 0x14) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000002640), 0x4) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xf, 0x5, 0x7, 0xbb, 0x8, r1, 0x1ff, '\x00', r4, r5, 0x2, 0x4, 0x4}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9f001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) (async) setsockopt$packet_buf(r2, 0x107, 0x4, &(0x7f0000000300)="f3ab6df6238da9a3b9164ac47ac3582573e15c91", 0x14) (async) socket$inet6_sctp(0xa, 0x0, 0x84) (async) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000002640), 0x4) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xf, 0x5, 0x7, 0xbb, 0x8, r1, 0x1ff, '\x00', r4, r5, 0x2, 0x4, 0x4}, 0x48) (async) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f30"], 0x0, 0x29}, 0x20) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x80000005}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x80000005}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x80000005}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) (async) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f"], 0x0, 0x29}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9f001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async, rerun: 64) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 64) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r2 = accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) setsockopt$packet_buf(r2, 0x107, 0x4, &(0x7f0000000300)="f3ab6df6238da9a3b9164ac47ac3582573e15c91", 0x14) (async) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000002640), 0x4) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) (async, rerun: 32) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 32) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xf, 0x5, 0x7, 0xbb, 0x8, r1, 0x1ff, '\x00', r4, r5, 0x2, 0x4, 0x4}, 0x48) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x80000005}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) (async, rerun: 64) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f"], 0x0, 0x29}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000060400000000005f"], 0x0, 0x29}, 0x20) 00:14:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c000000ffffff00000000060400000000005f5f0000003c0000000000"], 0x0, 0x29, 0x0, 0x1}, 0x20) futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) r13 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r13, &(0x7f0000001040)="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", 0x1000, 0x4040, &(0x7f0000000a80)={0x11, 0x1, r12, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 00:14:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000180)=0x100) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000040000000000000002000006040000000300000000010000010000000000000000275f006aef2f02e715151264ceebf3e48c15215c6e7896e987e6b9785712216fc0007af207ba689614ad848e744a5b61dbbd1624b3a41fc6199e6e0783e6b4d180bab0cb7de209bc8d82c539db918d4d7c8440f0f230744a5f162f82e6b8eece94f130b29696bcb403263fd3440eadeafa75d8898090bb768137d28929b69945165e750716e76c5f3bd32a6d02be539538b5941da9950b9b1e6aa64d98896fb3d13484792e8cc5eb3979185f0c00"/229], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x7}, 0x20) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x4, 0x9, 0xc21e, 0xffffffc0, 0xae, 0x3, 0x0, 0x80000000, r1}, 0x20) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 00:14:09 executing program 3: futex(&(0x7f0000000080)=0x1, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) [ 849.951521][ T962] sctp: [Deprecated]: syz-executor.2 (pid 962) Use of int in max_burst socket option. [ 849.951521][ T962] Use struct sctp_assoc_value instead 00:14:09 executing program 3: futex(0x0, 0xc, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:09 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) (async) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000180)=0x100) (async) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000180)=0x100) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000040000000000000002000006040000000300000000010000010000000000000000275f006aef2f02e715151264ceebf3e48c15215c6e7896e987e6b9785712216fc0007af207ba689614ad848e744a5b61dbbd1624b3a41fc6199e6e0783e6b4d180bab0cb7de209bc8d82c539db918d4d7c8440f0f230744a5f162f82e6b8eece94f130b29696bcb403263fd3440eadeafa75d8898090bb768137d28929b69945165e750716e76c5f3bd32a6d02be539538b5941da9950b9b1e6aa64d98896fb3d13484792e8cc5eb3979185f0c00"/229], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x7}, 0x20) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x4, 0x9, 0xc21e, 0xffffffc0, 0xae, 0x3, 0x0, 0x80000000, r1}, 0x20) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:09 executing program 3: futex(0x0, 0x0, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000180)=0x100) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000040000000000000002000006040000000300000000010000010000000000000000275f006aef2f02e715151264ceebf3e48c15215c6e7896e987e6b9785712216fc0007af207ba689614ad848e744a5b61dbbd1624b3a41fc6199e6e0783e6b4d180bab0cb7de209bc8d82c539db918d4d7c8440f0f230744a5f162f82e6b8eece94f130b29696bcb403263fd3440eadeafa75d8898090bb768137d28929b69945165e750716e76c5f3bd32a6d02be539538b5941da9950b9b1e6aa64d98896fb3d13484792e8cc5eb3979185f0c00"/229], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1, 0x7}, 0x20) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x4, 0x9, 0xc21e, 0xffffffc0, 0xae, 0x3, 0x0, 0x80000000, r1}, 0x20) (async) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) (async) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) (async, rerun: 64) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) (rerun: 64) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) (async, rerun: 32) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) (async, rerun: 32) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) (async) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) (async) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) (async) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) (async) r13 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r13, &(0x7f0000001040)="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", 0x1000, 0x4040, &(0x7f0000000a80)={0x11, 0x1, r12, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 00:14:10 executing program 3: futex(0x0, 0x0, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) [ 850.047119][ T983] sctp: [Deprecated]: syz-executor.2 (pid 983) Use of int in max_burst socket option. [ 850.047119][ T983] Use struct sctp_assoc_value instead 00:14:10 executing program 3: futex(0x0, 0x0, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) 00:14:10 executing program 3: futex(0x0, 0xc, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140), 0x5) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) (async) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) (async, rerun: 32) r3 = socket(0x2, 0x6, 0x8001) (rerun: 32) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) (async) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) (async) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) (async) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) (async) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) (async) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) (async) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) r13 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r13, &(0x7f0000001040)="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", 0x1000, 0x4040, &(0x7f0000000a80)={0x11, 0x1, r12, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 00:14:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) (rerun: 32) [ 850.123768][ T998] sctp: [Deprecated]: syz-executor.2 (pid 998) Use of int in max_burst socket option. [ 850.123768][ T998] Use struct sctp_assoc_value instead 00:14:10 executing program 3: futex(0x0, 0xc, 0x0, 0x0, &(0x7f0000000140), 0x5) 00:14:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x61e, @dev={0xfe, 0x80, '\x00', 0x26}, 0x8}, @in6={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x64010102}], 0x68) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 3: futex(0x0, 0xc, 0x0, 0x0, &(0x7f0000000140), 0x5) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) r13 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r13, &(0x7f0000001040)="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", 0x1000, 0x4040, &(0x7f0000000a80)={0x11, 0x1, r12, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 00:14:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) 00:14:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9febc64f83991a293c0b00001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 3: futex(0x0, 0xc, 0x0, 0x0, &(0x7f0000000140), 0x5) [ 850.203747][ T1015] sctp: [Deprecated]: syz-executor.2 (pid 1015) Use of int in max_burst socket option. [ 850.203747][ T1015] Use struct sctp_assoc_value instead 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: r0 = socket(0x2c, 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local}}, 0x1, 0x7ff}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:10 executing program 3: futex(0x0, 0xc, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x5) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(0x0, 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 3: futex(0x0, 0xc, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 00:14:10 executing program 4: r0 = socket(0x2c, 0x80000, 0x0) (async) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local}}, 0x1, 0x7ff}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) r13 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r13, &(0x7f0000001040)="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", 0x1000, 0x4040, &(0x7f0000000a80)={0x11, 0x1, r12, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(0x0, 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f, 0x2e]}}, 0x0, 0xfffffffffffffe6d, 0x0, 0x1}, 0x20) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x0, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)='%-5lx \x00'}, 0x20) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r4, 0xc0385720, &(0x7f0000000080)={0x1}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r7 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r7, 0xab00, r8) ioctl$NBD_DO_IT(r7, 0xab03) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000020000000000000008000080a568e0ff010000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff850000000600000090c77191778595"], &(0x7f0000000140)='syzkaller\x00', 0x80, 0x92, &(0x7f0000000180)=""/146, 0x40f00, 0x38, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0xe, 0x1, 0x2696}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000400)=[r1, 0xffffffffffffffff, r2, r3, 0x1, r5, r6, 0x1, 0xffffffffffffffff], &(0x7f0000000440)=[{0x0, 0x3, 0x7, 0xe}, {0x4, 0x2, 0x4, 0x9}, {0x1, 0x2, 0x4, 0x9}], 0x10, 0x5}, 0x90) 00:14:10 executing program 4: r0 = socket(0x2c, 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local}}, 0x1, 0x7ff}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) socket(0x2c, 0x80000, 0x0) (async) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local}}, 0x1, 0x7ff}, &(0x7f0000000000)=0x90) (async) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) [ 850.311180][ T1035] sctp: [Deprecated]: syz-executor.2 (pid 1035) Use of int in max_burst socket option. [ 850.311180][ T1035] Use struct sctp_assoc_value instead 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(0x0, 0x1, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000900)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000940)=0x18) r0 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000340), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000380)=0x0) sendmsg$NFC_CMD_DEP_LINK_DOWN(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4048800) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x400c000) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xe8, r0, 0x1, 0x70bd29, 0xffff0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcc}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x623acb6c}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa94b89f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28051f41}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd791f5a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd33f1be}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x48, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4787b5a5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x75}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1188d94d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xbf6e450}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1003ad04}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8004}, 0x24040040) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000600)={&(0x7f0000000980)={0x144, r0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x24, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4716f9d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b46295f}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ca93ad9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe070}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57dea6f6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3fa3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc67e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa673}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6320d73}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76c4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc26b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33c91765}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb0, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa187205}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43a444f6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a008cd8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb3}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ff0edc9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x793a31af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1a}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x219c9822}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65d6f2f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5089e9a4}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x144}, 0x1, 0x0, 0x0, 0x8004}, 0x20004040) sendmsg$NFC_CMD_GET_DEVICE(r3, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x44084}, 0x20040080) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100005f000000000000000034a5d6f642fd0d24246a2ee265c8d45905ba2a66a4fdce52ed36d1"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f00000005c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r4, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=0x0) sendmsg$NFC_CMD_ENABLE_SE(r3, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x54, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x80) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) r13 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r13, &(0x7f0000001040)="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", 0x1000, 0x4040, &(0x7f0000000a80)={0x11, 0x1, r12, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) [ 850.394588][ T1047] sctp: [Deprecated]: syz-executor.2 (pid 1047) Use of int in max_burst socket option. [ 850.394588][ T1047] Use struct sctp_assoc_value instead 00:14:10 executing program 5: syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000900)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000940)=0x18) r0 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000340), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000380)=0x0) sendmsg$NFC_CMD_DEP_LINK_DOWN(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4048800) (async, rerun: 64) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x400c000) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xe8, r0, 0x1, 0x70bd29, 0xffff0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcc}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x623acb6c}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa94b89f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28051f41}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd791f5a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd33f1be}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x48, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4787b5a5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x75}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1188d94d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xbf6e450}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1003ad04}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8004}, 0x24040040) (async) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000600)={&(0x7f0000000980)={0x144, r0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x24, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4716f9d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b46295f}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ca93ad9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe070}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57dea6f6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3fa3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc67e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa673}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6320d73}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76c4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc26b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33c91765}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb0, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa187205}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43a444f6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a008cd8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb3}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ff0edc9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x793a31af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1a}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x219c9822}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65d6f2f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5089e9a4}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x144}, 0x1, 0x0, 0x0, 0x8004}, 0x20004040) (async) sendmsg$NFC_CMD_GET_DEVICE(r3, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x44084}, 0x20040080) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100005f000000000000000034a5d6f642fd0d24246a2ee265c8d45905ba2a66a4fdce52ed36d1"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async, rerun: 32) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f00000005c0)) (async) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r4, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=0x0) sendmsg$NFC_CMD_ENABLE_SE(r3, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x54, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x80) 00:14:10 executing program 5: syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 5: syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0x3, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) socket$packet(0x11, 0x3, 0x300) [ 850.481626][ T1062] sctp: [Deprecated]: syz-executor.2 (pid 1062) Use of int in max_burst socket option. [ 850.481626][ T1062] Use struct sctp_assoc_value instead 00:14:10 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000900)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000940)=0x18) r0 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000340), 0xffffffffffffffff) (async, rerun: 64) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000380)=0x0) (rerun: 64) sendmsg$NFC_CMD_DEP_LINK_DOWN(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4048800) (async, rerun: 64) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x400c000) (async) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xe8, r0, 0x1, 0x70bd29, 0xffff0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x74, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcc}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x623acb6c}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x48}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa94b89f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x28051f41}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd791f5a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd33f1be}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x48, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4787b5a5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x75}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1188d94d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xbf6e450}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1003ad04}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8004}, 0x24040040) (async) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000600)={&(0x7f0000000980)={0x144, r0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x24, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4716f9d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b46295f}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ca93ad9}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe070}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57dea6f6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3fa3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc67e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa673}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6320d73}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76c4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc26b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33c91765}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xb0, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xa187205}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x84}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x43a444f6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2a008cd8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb3}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ff0edc9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x793a31af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1a}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x219c9822}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65d6f2f5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5089e9a4}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x144}, 0x1, 0x0, 0x0, 0x8004}, 0x20004040) sendmsg$NFC_CMD_GET_DEVICE(r3, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}]}, 0x24}, 0x1, 0x0, 0x0, 0x44084}, 0x20040080) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100005f000000000000000034a5d6f642fd0d24246a2ee265c8d45905ba2a66a4fdce52ed36d1"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, &(0x7f00000005c0)) (async) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002900)={0x34, r4, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x5}, 0x4000014) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=0x0) sendmsg$NFC_CMD_ENABLE_SE(r3, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x54, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r2}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x2}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r5}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0xc0}, @NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x80) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) 00:14:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r3 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r3, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r9, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r7, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r11, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r10, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000f4000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000000551ffff10000000852000000100000085100000ffffffff18500000050000000000000000000000181a0000", @ANYRES32=r1, @ANYBLOB="000000000000000018630000060006a200000000ce40000095000000000000008510000006000000850000009700000018000000040000000000000003000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x55, &(0x7f0000000240)=""/85, 0x41100, 0x20, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x1, 0x4, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[r5, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x1, 0xa}, {0x1, 0x2, 0xf}, {0x3, 0x4, 0xc, 0x1}, {0x5, 0x3, 0xb, 0x1}], 0x10, 0x301e}, 0x90) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) 00:14:10 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f0098"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 850.609085][ T1075] sctp: [Deprecated]: syz-executor.2 (pid 1075) Use of int in max_burst socket option. [ 850.609085][ T1075] Use struct sctp_assoc_value instead 00:14:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x0, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f0098"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) (async) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) (async) read$rfkill(r0, &(0x7f0000000040), 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f0098"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r9, 0x107, 0x2, 0x0, 0x0) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) getsockname$packet(r9, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x0, 0x80000001, 0x1000, 0x10000}) [ 850.690065][ T1086] sctp: [Deprecated]: syz-executor.2 (pid 1086) Use of int in max_burst socket option. [ 850.690065][ T1086] Use struct sctp_assoc_value instead 00:14:10 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) read$rfkill(r0, &(0x7f0000000040), 0x8) (async) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f0098"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f0098"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r9, 0x107, 0x2, 0x0, 0x0) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) setsockopt$packet_drop_memb(r10, 0x107, 0x2, 0x0, 0x0) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x0, 0x80000001, 0x1000, 0x10000}) 00:14:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) [ 850.785997][ T1096] sctp: [Deprecated]: syz-executor.2 (pid 1096) Use of int in max_burst socket option. [ 850.785997][ T1096] Use struct sctp_assoc_value instead 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x0, 0x1000, 0x10000}) 00:14:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) (async) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) (async) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) (async) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) (async) [ 850.818127][T13807] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 850.822062][T13807] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 850.824806][T13807] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 850.827430][T13807] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 850.830299][T13807] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 850.832169][T13807] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 00:14:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) (async, rerun: 32) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 32) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) (async) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) (async) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) (async) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) (async) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) 00:14:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r9, 0x107, 0x2, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000007c0), 0x607ca1039198f5d4, 0x0) 00:14:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x10000}) [ 850.927341][ T1100] chnl_net:caif_netlink_parms(): no params data found [ 850.985524][ T6138] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 850.988411][ T6138] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 850.990729][ T6138] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 850.992950][ T6138] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 850.996028][ T6138] Bluetooth: hci9: unexpected cc 0x0c25 length: 249 > 3 [ 850.996346][ T1100] bridge0: port 1(bridge_slave_0) entered blocking state [ 850.997878][ T6138] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 850.999467][ T1100] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.002582][ T1100] bridge_slave_0: entered allmulticast mode [ 851.009960][ T1100] bridge_slave_0: entered promiscuous mode [ 851.012815][ T1100] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.015247][ T1100] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.016968][ T1100] bridge_slave_1: entered allmulticast mode [ 851.018844][ T1100] bridge_slave_1: entered promiscuous mode [ 851.036406][ T1100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 851.040734][ T1100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 851.059339][ T1100] team0: Port device team_slave_0 added [ 851.079127][ T1100] team0: Port device team_slave_1 added [ 851.092900][ T1100] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 851.094885][ T1100] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 851.100709][ T1100] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 851.104718][ T1100] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 851.106295][ T1100] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 851.112266][ T1100] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 851.152961][T13220] block nbd3: Receive control failed (result -32) [ 851.153516][ T1039] block nbd3: shutting down sockets 00:14:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) 00:14:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000015a8fc9ba6152789000000001c0000001c02000000000000000000000200000604000000020000000000000001002000b9db31ebc7ed28b53ccba3c96c847ffe5a2db3e93639fd9fe294c99550ede6bfb12591a2c6fd67a77270652f92bde7568bf88764624aa7984b968df9344f68005886edc9ecb594639b13fbdc136e90863c342da822a232f15225ec44937be09d5fe72b671746f2237c6e5c15b49348436a3ddfa9db8240637bb022d4090058b82086f0a5c97622031dca19a001b47bf4777a9879ed116fa063dd3f814addf0baf786d5081faa9184aad4adbd3a6f11179f25ff31669046d9c7328cb4bd0a882b43ee66c6c139ed440e33c600000000000000000000001faa71cf55fdb8e3235d4e2ff01c955ab8d68c11f94e0e789f3ed0466c7b86da1db126b7e5fe2697889b5473ce5cc85604c2267cdae2fa0daa4fb0967698e221113f5a851e8e03af21edf4c3c33dd6fd35bebb5be0df2738d688bc05b09386bab9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r9, 0x107, 0x2, 0x0, 0x0) 00:14:11 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x3}) 00:14:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000015a8fc9ba6152789000000001c0000001c02000000000000000000000200000604000000020000000000000001002000b9db31ebc7ed28b53ccba3c96c847ffe5a2db3e93639fd9fe294c99550ede6bfb12591a2c6fd67a77270652f92bde7568bf88764624aa7984b968df9344f68005886edc9ecb594639b13fbdc136e90863c342da822a232f15225ec44937be09d5fe72b671746f2237c6e5c15b49348436a3ddfa9db8240637bb022d4090058b82086f0a5c97622031dca19a001b47bf4777a9879ed116fa063dd3f814addf0baf786d5081faa9184aad4adbd3a6f11179f25ff31669046d9c7328cb4bd0a882b43ee66c6c139ed440e33c600000000000000000000001faa71cf55fdb8e3235d4e2ff01c955ab8d68c11f94e0e789f3ed0466c7b86da1db126b7e5fe2697889b5473ce5cc85604c2267cdae2fa0daa4fb0967698e221113f5a851e8e03af21edf4c3c33dd6fd35bebb5be0df2738d688bc05b09386bab9"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) [ 851.194146][ T1100] hsr_slave_0: entered promiscuous mode 00:14:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) 00:14:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) 00:14:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) [ 851.267274][ T1100] hsr_slave_1: entered promiscuous mode 00:14:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880)=0x0, &(0x7f00000008c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r7, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r6, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000a40)=@IORING_OP_NOP={0x0, 0x36}) 00:14:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) 00:14:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x40bf, 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="60252b538826000000001c0000001c00000b0400000600000000020000260400000002000080000000000100000000000000005f5f010000000000000027c2f78f707dc8b1aa1de3b4258b68924c11ead947733eae86ca2a00005f4ce4fc8204b39c58cbe340b665b89d5da13d0acf2f35fc8cd8d5"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x10480, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x42002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x4, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xe, 0x3}, {0xd}, {0xb, 0x9}, {0x4, 0x2}, {0xa, 0x5}, {0x3}, {0x7, 0x1}, {0x8, 0x2}]}, @struct={0xa, 0x5, 0x0, 0x4, 0x0, 0x7, [{0x5, 0x0, 0x7}, {0x1, 0x0, 0x9}, {0x6, 0x3, 0x3}, {0xa, 0x0, 0x2}, {0x2, 0x2e, 0x8}]}, @enum={0xc, 0xa, 0x0, 0x6, 0x4, [{0x3, 0xffffffff}, {0xb, 0xff}, {0x6, 0xfff}, {0x10, 0xff}, {0x2, 0x154d}, {0x3, 0x10000}, {0xe, 0x5c06}, {0x8, 0x8000}, {0x0, 0x4}, {0xb, 0x7fffffff}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000640)=""/181, 0x10c, 0xb5, 0x1, 0xbf1f}, 0x20) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x8}, &(0x7f0000000400)=0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x8, &(0x7f0000000040)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x74}, @call={0x85, 0x0, 0x0, 0x1e}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}, @generic={0x40, 0x4, 0x5, 0x46, 0x7}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xb}], &(0x7f0000000080)='GPL\x00', 0x2, 0xa6, &(0x7f00000001c0)=""/166, 0x40f00, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x2, 0x80, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000300)=[r2, r4, 0xffffffffffffffff], &(0x7f0000000340)=[{0x0, 0x4, 0x0, 0xc}], 0x10, 0xff}, 0x90) 00:14:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) [ 851.319840][ T1100] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 851.321597][ T1100] Cannot create hsr debugfs directory 00:14:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) [ 851.408684][ T1123] chnl_net:caif_netlink_parms(): no params data found [ 851.459754][ T1100] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.481890][ T1123] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.483951][ T1123] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.485783][ T1123] bridge_slave_0: entered allmulticast mode [ 851.487771][ T1123] bridge_slave_0: entered promiscuous mode [ 851.490747][ T1123] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.492517][ T1123] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.494563][ T1123] bridge_slave_1: entered allmulticast mode [ 851.496599][ T1123] bridge_slave_1: entered promiscuous mode [ 851.520496][ T1100] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.526713][ T1123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 851.530600][ T1123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 851.544955][ T1123] team0: Port device team_slave_0 added [ 851.547764][ T1123] team0: Port device team_slave_1 added [ 851.559673][ T1123] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 851.561328][ T1123] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 851.567488][ T1123] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 851.571214][ T1123] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 851.572893][ T1123] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 851.579413][ T1123] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 851.606574][ T1100] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.685192][ T1123] hsr_slave_0: entered promiscuous mode [ 851.742121][ T1123] hsr_slave_1: entered promiscuous mode [ 851.793420][ T1123] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 851.795256][ T1123] Cannot create hsr debugfs directory [ 851.823402][ T1100] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.982446][ T1123] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.029581][ T1123] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.076312][ T1123] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.141856][ T1123] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.301096][ T1100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 852.315087][ T1100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 852.366508][ T1100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 852.420484][ T1100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 852.512711][ T1123] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 852.555361][ T1123] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 852.595047][ T1123] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 852.635742][ T1123] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 852.714066][ T1100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.730484][ T1100] 8021q: adding VLAN 0 to HW filter on device team0 [ 852.746097][T27379] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.747683][T27379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.754189][ T1123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.758169][ T1375] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.759820][ T1375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.771946][ T1123] 8021q: adding VLAN 0 to HW filter on device team0 [ 852.806397][ T1375] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.807965][ T1375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.811590][ T1375] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.813209][ T1375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.903559][T13220] Bluetooth: hci8: command 0x0409 tx timeout [ 852.910861][ T1100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 852.932464][ T1100] veth0_vlan: entered promiscuous mode [ 852.942942][ T1100] veth1_vlan: entered promiscuous mode [ 852.957563][ T1123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 852.972306][ T1100] veth0_macvtap: entered promiscuous mode [ 852.977285][ T1100] veth1_macvtap: entered promiscuous mode [ 852.997343][ T1123] veth0_vlan: entered promiscuous mode [ 853.004293][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.006608][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.008928][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.011312][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.014103][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.017163][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.019387][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.021744][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.024157][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.026512][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.028882][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.031238][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.033616][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.035984][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.038126][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.040430][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.044570][ T1100] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 853.049298][ T1123] veth1_vlan: entered promiscuous mode [ 853.060767][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.063243][T13220] Bluetooth: hci9: command 0x0409 tx timeout [ 853.065572][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.067737][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.070082][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.072430][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.075284][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.077536][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.079913][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.082244][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.085713][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.088014][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.090428][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.092653][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.095360][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.097595][ T1100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.099893][ T1100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.104056][ T1100] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 853.112360][ T1100] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.117846][ T1100] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.119787][ T1100] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.121712][ T1100] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.138392][ T1123] veth0_macvtap: entered promiscuous mode [ 853.157171][ T1123] veth1_macvtap: entered promiscuous mode [ 853.172936][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.176140][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.178409][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.180724][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.182751][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.186403][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.188558][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.190804][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.192961][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.196211][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.198503][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.200855][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.203844][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.206214][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.208400][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.210694][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.212896][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 853.215990][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.219391][ T1123] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 853.224052][T31631] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 853.225800][T31631] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 853.234681][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.237017][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.239211][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.241644][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.244604][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.247027][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.249150][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.251512][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.254804][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.257255][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.259621][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.262024][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.265730][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.268108][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.270360][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.272733][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.275567][ T1123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 853.277928][ T1123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 853.281323][ T1123] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 853.293946][ T1123] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.295931][ T1123] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.297786][ T1123] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.299876][ T1123] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 853.320167][T31631] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 853.331945][T31631] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 853.350347][T31631] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 853.352341][T31631] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 853.368845][T31629] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 853.370848][T31629] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 854.993266][T13220] Bluetooth: hci8: command 0x041b tx timeout [ 855.143211][T13220] Bluetooth: hci9: command 0x041b tx timeout [ 855.543796][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 55 seconds [ 857.063350][T13220] Bluetooth: hci8: command 0x040f tx timeout [ 857.223280][T13220] Bluetooth: hci9: command 0x040f tx timeout [ 859.153646][T13220] Bluetooth: hci8: command 0x0419 tx timeout [ 859.303276][T13220] Bluetooth: hci9: command 0x0419 tx timeout [ 861.953606][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 60 seconds [ 863.233516][ T2224] ieee802154 phy0 wpan0: encryption failed: -22 [ 863.235016][ T2224] ieee802154 phy1 wpan1: encryption failed: -22 [ 868.345947][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 65 seconds [ 874.743392][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 70 seconds [ 881.155908][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 75 seconds 00:14:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)=0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r7, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r5, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000640), &(0x7f0000000680)=0x4) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000440)={r3, 0x0, 0x10000, 0x1000000000000}) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) 00:14:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x40bf, 0x4) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="60252b538826000000001c0000001c00000b0400000600000000020000260400000002000080000000000100000000000000005f5f010000000000000027c2f78f707dc8b1aa1de3b4258b68924c11ead947733eae86ca2a00005f4ce4fc8204b39c58cbe340b665b89d5da13d0acf2f35fc8cd8d5"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x10480, 0x0) (async) socket$packet(0x11, 0x3, 0x300) (async) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x42002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x4, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xe, 0x3}, {0xd}, {0xb, 0x9}, {0x4, 0x2}, {0xa, 0x5}, {0x3}, {0x7, 0x1}, {0x8, 0x2}]}, @struct={0xa, 0x5, 0x0, 0x4, 0x0, 0x7, [{0x5, 0x0, 0x7}, {0x1, 0x0, 0x9}, {0x6, 0x3, 0x3}, {0xa, 0x0, 0x2}, {0x2, 0x2e, 0x8}]}, @enum={0xc, 0xa, 0x0, 0x6, 0x4, [{0x3, 0xffffffff}, {0xb, 0xff}, {0x6, 0xfff}, {0x10, 0xff}, {0x2, 0x154d}, {0x3, 0x10000}, {0xe, 0x5c06}, {0x8, 0x8000}, {0x0, 0x4}, {0xb, 0x7fffffff}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000640)=""/181, 0x10c, 0xb5, 0x1, 0xbf1f}, 0x20) (async) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x8}, &(0x7f0000000400)=0x8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x8, &(0x7f0000000040)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x74}, @call={0x85, 0x0, 0x0, 0x1e}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}, @generic={0x40, 0x4, 0x5, 0x46, 0x7}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xb}], &(0x7f0000000080)='GPL\x00', 0x2, 0xa6, &(0x7f00000001c0)=""/166, 0x40f00, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x2, 0x80, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000300)=[r2, r4, 0xffffffffffffffff], &(0x7f0000000340)=[{0x0, 0x4, 0x0, 0xc}], 0x10, 0xff}, 0x90) [ 883.429956][ T1182] sctp_getsockopt_maxburst: 4 callbacks suppressed [ 883.429970][ T1182] sctp: [Deprecated]: syz-executor.2 (pid 1182) Use of int in max_burst socket option. [ 883.429970][ T1182] Use struct sctp_assoc_value instead 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x40bf, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="60252b538826000000001c0000001c00000b0400000600000000020000260400000002000080000000000100000000000000005f5f010000000000000027c2f78f707dc8b1aa1de3b4258b68924c11ead947733eae86ca2a00005f4ce4fc8204b39c58cbe340b665b89d5da13d0acf2f35fc8cd8d5"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="60252b538826000000001c0000001c00000b0400000600000000020000260400000002000080000000000100000000000000005f5f010000000000000027c2f78f707dc8b1aa1de3b4258b68924c11ead947733eae86ca2a00005f4ce4fc8204b39c58cbe340b665b89d5da13d0acf2f35fc8cd8d5"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380), 0x10480, 0x0) socket$packet(0x11, 0x3, 0x300) (async) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x42002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x4, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xe, 0x3}, {0xd}, {0xb, 0x9}, {0x4, 0x2}, {0xa, 0x5}, {0x3}, {0x7, 0x1}, {0x8, 0x2}]}, @struct={0xa, 0x5, 0x0, 0x4, 0x0, 0x7, [{0x5, 0x0, 0x7}, {0x1, 0x0, 0x9}, {0x6, 0x3, 0x3}, {0xa, 0x0, 0x2}, {0x2, 0x2e, 0x8}]}, @enum={0xc, 0xa, 0x0, 0x6, 0x4, [{0x3, 0xffffffff}, {0xb, 0xff}, {0x6, 0xfff}, {0x10, 0xff}, {0x2, 0x154d}, {0x3, 0x10000}, {0xe, 0x5c06}, {0x8, 0x8000}, {0x0, 0x4}, {0xb, 0x7fffffff}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000640)=""/181, 0x10c, 0xb5, 0x1, 0xbf1f}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x4, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xe, 0x3}, {0xd}, {0xb, 0x9}, {0x4, 0x2}, {0xa, 0x5}, {0x3}, {0x7, 0x1}, {0x8, 0x2}]}, @struct={0xa, 0x5, 0x0, 0x4, 0x0, 0x7, [{0x5, 0x0, 0x7}, {0x1, 0x0, 0x9}, {0x6, 0x3, 0x3}, {0xa, 0x0, 0x2}, {0x2, 0x2e, 0x8}]}, @enum={0xc, 0xa, 0x0, 0x6, 0x4, [{0x3, 0xffffffff}, {0xb, 0xff}, {0x6, 0xfff}, {0x10, 0xff}, {0x2, 0x154d}, {0x3, 0x10000}, {0xe, 0x5c06}, {0x8, 0x8000}, {0x0, 0x4}, {0xb, 0x7fffffff}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000640)=""/181, 0x10c, 0xb5, 0x1, 0xbf1f}, 0x20) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x8}, &(0x7f0000000400)=0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x8, &(0x7f0000000040)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x74}, @call={0x85, 0x0, 0x0, 0x1e}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}, @generic={0x40, 0x4, 0x5, 0x46, 0x7}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xb}], &(0x7f0000000080)='GPL\x00', 0x2, 0xa6, &(0x7f00000001c0)=""/166, 0x40f00, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x2, 0x80, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000300)=[r2, r4, 0xffffffffffffffff], &(0x7f0000000340)=[{0x0, 0x4, 0x0, 0xc}], 0x10, 0xff}, 0x90) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) accept$netrom(r1, &(0x7f00000004c0)={{0x3, @bcast}, [@rose, @default, @netrom, @netrom, @rose, @netrom, @remote, @null]}, &(0x7f0000000540)=0x48) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)=0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r6, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) syz_io_uring_submit(0x0, r4, &(0x7f0000000900)=@IORING_OP_POLL_REMOVE={0x7, 0x20, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) [ 883.537617][ T1192] sctp: [Deprecated]: syz-executor.2 (pid 1192) Use of int in max_burst socket option. [ 883.537617][ T1192] Use struct sctp_assoc_value instead 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000c80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000d80)={0x2a8, r5, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xd4, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3d7d324e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39962c64}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x40d42228}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57e0fa05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2679c805}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4836}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x74cbf569}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc0de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf210}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6bda}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x51649284}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc59}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x377d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x348322ca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3cf3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3dc3f4c2}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x784fe4f7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc0a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b2c70}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc3ab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dfbdad3}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7a4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3d36}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb210}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa1cc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x18c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb3b4}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fbb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa44a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32856d3f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x73b8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7bdeb8dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x415aee04}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e7ff169}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc1ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf895}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77c97d26}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ddb6304}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9143}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa97a32d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3360d934}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3a81}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf1ca}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x19ff}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9365}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31b30aee}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29256e6c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61444902}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbca}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x758}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x273aa574}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf297}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa86e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd0c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3ab3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfda3}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55b81efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x341dec41}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5faf4e7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39fb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x787e}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf999}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd5ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf9d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a790809}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd7f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c8f4cde}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5be}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x168583a2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cece49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6c3bba45}]}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x811}, 0x40c5) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) [ 883.596278][ T1202] sctp: [Deprecated]: syz-executor.2 (pid 1202) Use of int in max_burst socket option. [ 883.596278][ T1202] Use struct sctp_assoc_value instead 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a00), 0xffffffffffffffff) 00:14:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x20001}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 883.663649][ T1211] sctp: [Deprecated]: syz-executor.2 (pid 1211) Use of int in max_burst socket option. [ 883.663649][ T1211] Use struct sctp_assoc_value instead 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 00:14:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x20001}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x20001}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x20001}, 0x20) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2}, 0x48) (async) [ 883.725756][ T1221] sctp: [Deprecated]: syz-executor.2 (pid 1221) Use of int in max_burst socket option. [ 883.725756][ T1221] Use struct sctp_assoc_value instead 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x2) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:43 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DISCONNECT(r0, 0xab08) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r2) r3 = syz_io_uring_complete(0x0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x4) sched_rr_get_interval(r2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004082096e668e70000000000000002000006040000000200000000000000010000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) [ 883.778556][ T1231] sctp: [Deprecated]: syz-executor.2 (pid 1231) Use of int in max_burst socket option. [ 883.778556][ T1231] Use struct sctp_assoc_value instead 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) [ 883.818008][ T1238] sctp: [Deprecated]: syz-executor.2 (pid 1238) Use of int in max_burst socket option. [ 883.818008][ T1238] Use struct sctp_assoc_value instead 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000940), &(0x7f0000000980)=0x4) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 883.853971][ T1235] block nbd4: NBD_DISCONNECT [ 883.860834][ T1242] sctp: [Deprecated]: syz-executor.2 (pid 1242) Use of int in max_burst socket option. [ 883.860834][ T1242] Use struct sctp_assoc_value instead 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:43 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DISCONNECT(r0, 0xab08) (async) ioctl$NBD_DISCONNECT(r0, 0xab08) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r2) r3 = syz_io_uring_complete(0x0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x4) sched_rr_get_interval(r2, &(0x7f0000000000)) (async) sched_rr_get_interval(r2, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004082096e668e70000000000000002000006040000000200000000000000010000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000002500), &(0x7f0000002540)=0xe) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) socket$inet6_sctp(0xa, 0x5, 0x84) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 883.974001][ T1256] block nbd4: Device being setup by another task [ 883.976797][ T1263] block nbd4: NBD_DISCONNECT [ 883.982333][ T1256] block nbd4: NBD_DISCONNECT 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r2 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)=r1}, 0x20) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r1}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) r1 = socket(0x2, 0x6, 0x8001) getsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x4) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r0}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000025c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) ioctl$NBD_DISCONNECT(r0, 0xab08) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r2) (async) r3 = syz_io_uring_complete(0x0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x4) (async) sched_rr_get_interval(r2, &(0x7f0000000000)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000004082096e668e70000000000000002000006040000000200000000000000010000000000"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) socket(0x2, 0x6, 0x8001) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r0}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) [ 884.105388][ T1284] block nbd4: NBD_DISCONNECT [ 884.114190][ T1284] block nbd4: Send disconnect failed -32 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) [ 884.153392][ T1282] block nbd4: Device being setup by another task 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000900000009000000005000000080000000000000e0500000001000000060000000000000202000000010000000400000a8c69730007000000ffffff7f020000007cffffff010000000000000a04000000090000000000000c040000000c0005000000000900000001000000970000000f00000005000000ae00514223f89f00000c0000000000000a03000000"], &(0x7f0000000380)=""/156, 0xad, 0x9c, 0x0, 0x1}, 0x20) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r0}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x26, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r0, 0x4) 00:14:44 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x26}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x26, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r0, 0x4) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r0}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 00:14:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x26, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r0, 0x4) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3, 0x0, r0}, &(0x7f0000000880), &(0x7f00000008c0)) [ 884.285987][ T1290] block nbd4: Disconnected due to user request. [ 884.292341][ T1290] block nbd4: shutting down sockets 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 00:14:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000040000000000000002000006040000000200c15c7b68afa55f6335a60000000000000100000000001000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x3, 0x0, 0x3}, {0x5, 0xfc, 0x4}]}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xa, &(0x7f0000000000)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0x5, 0xb, 0x7, 0x0, 0x1f}, @alu={0x7, 0x1, 0x4, 0x0, 0x2, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x17, &(0x7f00000001c0)=""/23, 0x41000, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1], 0x0, 0x10, 0x7}, 0x90) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x44100, 0x0) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000040000000000000002000006040000000200c15c7b68afa55f6335a60000000000000100000000001000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x3, 0x0, 0x3}, {0x5, 0xfc, 0x4}]}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xa, &(0x7f0000000000)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0x5, 0xb, 0x7, 0x0, 0x1f}, @alu={0x7, 0x1, 0x4, 0x0, 0x2, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x17, &(0x7f00000001c0)=""/23, 0x41000, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1], 0x0, 0x10, 0x7}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000040000000000000002000006040000000200c15c7b68afa55f6335a60000000000000100000000001000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) socket$packet(0x11, 0x2, 0x300) (async) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x3, 0x0, 0x3}, {0x5, 0xfc, 0x4}]}, 0x10) (async) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xa, &(0x7f0000000000)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0x5, 0xb, 0x7, 0x0, 0x1f}, @alu={0x7, 0x1, 0x4, 0x0, 0x2, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x17, &(0x7f00000001c0)=""/23, 0x41000, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1], 0x0, 0x10, 0x7}, 0x90) (async) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000000005f00"], 0x0, 0x28, 0x0, 0x1}, 0x20) syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 00:14:44 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000040000000000000002000006040000000200c15c7b68afa55f6335a60000000000000100000000001000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000040000000000000002000006040000000200c15c7b68afa55f6335a60000000000000100000000001000005f5f00"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x3, 0x0, 0x3}, {0x5, 0xfc, 0x4}]}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0xa, &(0x7f0000000000)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @generic={0x5, 0xb, 0x7, 0x0, 0x1f}, @alu={0x7, 0x1, 0x4, 0x0, 0x2, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000000080)='syzkaller\x00', 0x20, 0x17, &(0x7f00000001c0)=""/23, 0x41000, 0x2, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1], 0x0, 0x10, 0x7}, 0x90) 00:14:44 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000014010000140100000500000f03000000030000001f000000ff7f0000040000000800000000800000040000000900000004000000040000000000000081000000030400007f000005ffffffff39d8bf0d0000000000000a050000000000000000000003000000000300000005000000ff0700000001000000020000000000000100000000180028000d00000000000009000000000800000000000800000000000007f57a82184eee6bd20000000900000009000000050000000200000003000000040000006a000000030000000500000005000000000100000500000005000000090000000400000002000000ff0700000200000008000000ff7f0000cd00005f2e306161305f00"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) 00:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) 00:14:44 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000d75a608c95f7ad4dd04a98fdb3294100"], &(0x7f00000000c0)=""/27, 0xd8462a969b1a544f, 0x1b, 0x2, 0x6ba}, 0x20) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 00:14:44 executing program 2: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x2a13, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 4: getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9bb7, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}}, 0x5}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r0, 0x9, 0x81}, &(0x7f0000000200)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 2: syz_io_uring_setup(0x5090, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 5: setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 4: getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9bb7, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}}, 0x5}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r0, 0x9, 0x81}, &(0x7f0000000200)=0x8) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (rerun: 32) 00:14:44 executing program 5: setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 2: syz_io_uring_setup(0x5090, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 4: getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9bb7, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}}, 0x5}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r0, 0x9, 0x81}, &(0x7f0000000200)=0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9bb7, @ipv4={'\x00', '\xff\xff', @remote}, 0x6}}, 0x5}, &(0x7f0000000000)=0x90) (async) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r0, 0x9, 0x81}, &(0x7f0000000200)=0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:14:44 executing program 2: syz_io_uring_setup(0x5090, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 5: setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:14:44 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480), 0x4) 00:14:44 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) [ 884.844649][T13807] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 884.850182][T13807] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 884.852718][T13807] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 00:14:44 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) [ 884.856958][T13807] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 884.859227][T13807] Bluetooth: hci10: unexpected cc 0x0c25 length: 249 > 3 [ 884.861081][T13807] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 00:14:44 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), r0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:14:44 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480), 0x4) [ 884.906710][T13220] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 884.913766][T13220] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 884.915981][T13220] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 00:14:44 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) [ 884.931598][T13220] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 884.934627][T13220] Bluetooth: hci11: unexpected cc 0x0c25 length: 249 > 3 [ 884.940076][T13220] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x4, '\x00', 0x0, r0, 0x5, 0x4}, 0x48) 00:14:44 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:14:44 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480), 0x4) [ 885.100014][ T1402] chnl_net:caif_netlink_parms(): no params data found [ 885.162389][ T1402] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.164939][ T1402] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.166637][ T1402] bridge_slave_0: entered allmulticast mode [ 885.168536][ T1402] bridge_slave_0: entered promiscuous mode [ 885.172824][ T1402] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.175075][ T1402] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.176752][ T1402] bridge_slave_1: entered allmulticast mode [ 885.178693][ T1402] bridge_slave_1: entered promiscuous mode [ 885.191855][ T1402] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 885.195964][ T1402] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 885.204685][ T1411] chnl_net:caif_netlink_parms(): no params data found [ 885.225523][ T1402] team0: Port device team_slave_0 added [ 885.230324][ T1402] team0: Port device team_slave_1 added [ 885.245598][ T1402] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 885.247272][ T1402] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 885.253560][ T1402] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 885.259306][ T1402] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 885.260808][ T1402] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 885.267271][ T1402] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 885.282588][ T1411] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.284547][ T1411] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.286277][ T1411] bridge_slave_0: entered allmulticast mode [ 885.289231][ T1411] bridge_slave_0: entered promiscuous mode [ 885.292303][ T1411] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.294452][ T1411] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.296243][ T1411] bridge_slave_1: entered allmulticast mode [ 885.298176][ T1411] bridge_slave_1: entered promiscuous mode [ 885.314635][ T1411] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 885.322484][ T1411] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 885.385427][ T1402] hsr_slave_0: entered promiscuous mode [ 885.423508][ T1402] hsr_slave_1: entered promiscuous mode [ 885.464240][ T1402] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 885.466074][ T1402] Cannot create hsr debugfs directory [ 885.470122][ T1411] team0: Port device team_slave_0 added [ 885.472944][ T1411] team0: Port device team_slave_1 added [ 885.499018][ T1411] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 885.500685][ T1411] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 885.507198][ T1411] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 885.513267][ T1411] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 885.514771][ T1411] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 885.520656][ T1411] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 885.615563][ T1411] hsr_slave_0: entered promiscuous mode [ 885.653615][ T1411] hsr_slave_1: entered promiscuous mode [ 885.693286][ T1411] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 885.694971][ T1411] Cannot create hsr debugfs directory [ 885.740179][ T1402] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 885.817577][ T1402] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 885.877590][ T1402] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 885.936514][ T1402] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.053813][ T1411] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.120099][ T1411] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.187131][ T1411] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.265828][ T1411] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.419429][ T1402] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 886.454763][ T1402] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 886.494653][ T1402] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 886.538284][ T1402] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 886.638678][ T1411] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 886.675376][ T1411] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 886.724563][ T1402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 886.726835][ T1411] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 886.774915][ T1411] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 886.822324][ T1402] 8021q: adding VLAN 0 to HW filter on device team0 [ 886.833912][ T478] bridge0: port 1(bridge_slave_0) entered blocking state [ 886.835558][ T478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 886.847950][ T6188] bridge0: port 2(bridge_slave_1) entered blocking state [ 886.849551][ T6188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 886.882319][ T1402] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 886.888376][ T1402] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 886.904332][T13807] Bluetooth: hci10: command 0x0409 tx timeout [ 886.929414][ T1411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 886.938786][ T1411] 8021q: adding VLAN 0 to HW filter on device team0 [ 886.943385][T27379] bridge0: port 1(bridge_slave_0) entered blocking state [ 886.945067][T27379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 886.963016][ T1411] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 886.966866][ T1411] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 886.970712][T27379] bridge0: port 2(bridge_slave_1) entered blocking state [ 886.972350][T27379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 886.983296][T13807] Bluetooth: hci11: command 0x0409 tx timeout [ 887.020304][ T1402] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 887.051294][ T1411] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 887.077121][ T1402] veth0_vlan: entered promiscuous mode [ 887.085169][ T1411] veth0_vlan: entered promiscuous mode [ 887.090058][ T1411] veth1_vlan: entered promiscuous mode [ 887.097845][ T1402] veth1_vlan: entered promiscuous mode [ 887.112030][ T1411] veth0_macvtap: entered promiscuous mode [ 887.118296][ T1411] veth1_macvtap: entered promiscuous mode [ 887.132784][ T1402] veth0_macvtap: entered promiscuous mode [ 887.140342][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.142696][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.147053][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.149385][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.151687][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.154591][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.156870][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.159290][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.161560][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.165350][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.167652][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.169988][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.172263][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.174970][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.177252][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.179527][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.181858][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.184803][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.186972][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.189283][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.192633][ T1411] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 887.199568][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.201828][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.204590][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.207202][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.209489][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.211763][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.214395][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.217473][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.219641][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.221962][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.225790][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.228249][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.230569][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.232948][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.235792][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.238335][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.240405][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.242883][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.245514][ T1411] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.247793][ T1411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.251248][ T1411] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 887.255000][ T1402] veth1_macvtap: entered promiscuous mode [ 887.262571][ T1411] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.265108][ T1411] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.267154][ T1411] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.269105][ T1411] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.279244][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.281783][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.284934][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.287270][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.289497][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.291936][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.295197][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.297547][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.299752][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.302142][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.304998][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.307402][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.309716][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.312142][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.314370][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.316688][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.318836][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.321919][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.324602][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.326932][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.329132][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 887.331432][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.335012][ T1402] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 887.342946][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.346001][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.348211][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.350581][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.352781][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.355862][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.358020][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.360467][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.362616][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.367116][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.369297][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.371632][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.374005][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.376371][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.378558][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.380926][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.383771][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.386181][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.388468][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.390898][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.393231][ T1402] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 887.395598][ T1402] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 887.398826][ T1402] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 887.415988][ T1402] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.418086][ T1402] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.420111][ T1402] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.422982][ T1402] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 887.470650][T29059] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 887.476490][T29059] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 887.508512][T31629] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 887.510403][T31629] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 887.518495][T29059] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 887.520270][T29059] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 887.532572][T29058] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 887.534507][T29058] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 887.553873][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 80 seconds [ 888.983282][T13807] Bluetooth: hci10: command 0x041b tx timeout [ 889.063271][T13807] Bluetooth: hci11: command 0x041b tx timeout [ 891.073363][T13807] Bluetooth: hci10: command 0x040f tx timeout [ 891.143359][T13807] Bluetooth: hci11: command 0x040f tx timeout [ 893.143575][T13807] Bluetooth: hci10: command 0x0419 tx timeout [ 893.223750][T13807] Bluetooth: hci11: command 0x0419 tx timeout [ 893.953803][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 85 seconds [ 900.344752][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 90 seconds [ 906.743718][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 95 seconds [ 913.153941][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 100 seconds 00:15:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) 00:15:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x4, '\x00', 0x0, r0, 0x5, 0x4}, 0x48) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100, 0x0, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:17 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 00:15:17 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x4, '\x00', 0x0, r0, 0x5, 0x4}, 0x48) 00:15:17 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 4: sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0xc1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 4: sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0xc1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0xc1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 4: sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0xc1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 4: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], 0x0, 0x10, 0x1ff}, 0x90) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) r7 = getpgid(r2) write$FUSE_LK(r3, &(0x7f0000000340)={0x28, 0xffffffffffffffda, 0x0, {{0xffffffff, 0x7fd0, 0x2, r7}}}, 0x28) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, &(0x7f0000000880), 0x0) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, &(0x7f0000000880), 0x0) 00:15:17 executing program 4: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) (async) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) (async) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], 0x0, 0x10, 0x1ff}, 0x90) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) (async) r7 = getpgid(r2) write$FUSE_LK(r3, &(0x7f0000000340)={0x28, 0xffffffffffffffda, 0x0, {{0xffffffff, 0x7fd0, 0x2, r7}}}, 0x28) 00:15:17 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:17 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:17 executing program 2: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, &(0x7f0000000880), 0x0) 00:15:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) (async) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], 0x0, 0x10, 0x1ff}, 0x90) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) (async) r7 = getpgid(r2) write$FUSE_LK(r3, &(0x7f0000000340)={0x28, 0xffffffffffffffda, 0x0, {{0xffffffff, 0x7fd0, 0x2, r7}}}, 0x28) 00:15:18 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, &(0x7f00000008c0)) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], 0x0, 0x10, 0x1ff}, 0x90) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) r7 = getpgid(r2) write$FUSE_LK(r3, &(0x7f0000000340)={0x28, 0xffffffffffffffda, 0x0, {{0xffffffff, 0x7fd0, 0x2, r7}}}, 0x28) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000040000000a0058ff5b47000700000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x1}, 0x20) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x701002, 0x0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000440)={0x1, 0x100, 0x3562}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0xfb, 0x4, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1, 0x8000, 0x1, 0x7}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000480)=0x6, 0x4) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x4, '\x00', r4, r2, 0x1, 0x5}, 0x48) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x19, 0x0, r5, 0x1, '\x00', r6, 0xffffffffffffffff, 0x4, 0x3, 0x3}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x5, '\x00', r4, 0xffffffffffffffff, 0x2}, 0x48) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, 0x0, 0x0, &(0x7f00000008c0)) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, 0x0, 0x0, &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], 0x0, 0x10, 0x1ff}, 0x90) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) r7 = getpgid(r2) write$FUSE_LK(r3, &(0x7f0000000340)={0x28, 0xffffffffffffffda, 0x0, {{0xffffffff, 0x7fd0, 0x2, r7}}}, 0x28) [ 918.144404][ T1546] block nbd4: shutting down sockets 00:15:18 executing program 5: syz_io_uring_setup(0x5090, 0x0, 0x0, &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x8, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) (async) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000040000000a0058ff5b47000700000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x1}, 0x20) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x701002, 0x0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000440)={0x1, 0x100, 0x3562}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0xfb, 0x4, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1, 0x8000, 0x1, 0x7}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000480)=0x6, 0x4) (async) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000480)=0x6, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x4, '\x00', r4, r2, 0x1, 0x5}, 0x48) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x4, '\x00', r4, r2, 0x1, 0x5}, 0x48) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x19, 0x0, r5, 0x1, '\x00', r6, 0xffffffffffffffff, 0x4, 0x3, 0x3}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x5, '\x00', r4, 0xffffffffffffffff, 0x2}, 0x48) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800), 0x0, &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r5], 0x0, 0x10, 0x1ff}, 0x90) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) r7 = getpgid(r2) write$FUSE_LK(r3, &(0x7f0000000340)={0x28, 0xffffffffffffffda, 0x0, {{0xffffffff, 0x7fd0, 0x2, r7}}}, 0x28) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800), 0x0, &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 918.273367][ T1566] block nbd4: Device being setup by another task [ 918.276146][ T1563] block nbd4: shutting down sockets 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800), 0x0, &(0x7f00000008c0)) 00:15:18 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) (rerun: 64) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) (async) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000040000000a0058ff5b47000700000000005f5f00"], &(0x7f00000000c0)=""/27, 0x28, 0x1b, 0x1}, 0x20) (async) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x701002, 0x0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000440)={0x1, 0x100, 0x3562}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0xfb, 0x4, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1, 0x8000, 0x1, 0x7}}) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000480)=0x6, 0x4) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x4, '\x00', r4, r2, 0x1, 0x5}, 0x48) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x19, 0x0, r5, 0x1, '\x00', r6, 0xffffffffffffffff, 0x4, 0x3, 0x3}, 0x48) (async, rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x5, '\x00', r4, 0xffffffffffffffff, 0x2}, 0x48) (rerun: 32) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x100}, 0x0, 0x0) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r4], 0x0, 0x10, 0x1ff}, 0x90) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) getpgid(r2) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800), 0x0, &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async, rerun: 64) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) (rerun: 64) 00:15:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000480)=0x9, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x9, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, 0x1}, @ldst={0x1, 0x0, 0x2, 0xa, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r4], 0x0, 0x10, 0x1ff}, 0x90) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) getpgid(r2) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000000)='GPL\x00', 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x7f, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @bcast}, [@null, @netrom, @remote, @rose, @remote, @bcast, @null]}, &(0x7f0000000000)=0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x11, 0x0, r0, 0x80, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x0, 0x3, "c86c868333aa1e8d7b522a9d3f5513c7bbe40971ddcaddb1c6816815ea29bbdefa4f5373dfac674a578138766c0e7c4637e1d65b5a2469b5879eaad30cd465", 0xb}, 0x0, 0x0, 0x1}) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r3], 0x0, 0x10, 0x1ff}, 0x90) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000700)=0x7ff00000, 0x4) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @bcast}, [@null, @netrom, @remote, @rose, @remote, @bcast, @null]}, &(0x7f0000000000)=0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x11, 0x0, r0, 0x80, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x0, 0x3, "c86c868333aa1e8d7b522a9d3f5513c7bbe40971ddcaddb1c6816815ea29bbdefa4f5373dfac674a578138766c0e7c4637e1d65b5a2469b5879eaad30cd465", 0xb}, 0x0, 0x0, 0x1}) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r3], 0x0, 0x10, 0x1ff}, 0x90) openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0), 0x202000, 0x0) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0xf4, &(0x7f00000001c0)=""/244, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @bcast}, [@null, @netrom, @remote, @rose, @remote, @bcast, @null]}, &(0x7f0000000000)=0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x11, 0x0, r0, 0x80, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x0, 0x3, "c86c868333aa1e8d7b522a9d3f5513c7bbe40971ddcaddb1c6816815ea29bbdefa4f5373dfac674a578138766c0e7c4637e1d65b5a2469b5879eaad30cd465", 0xb}, 0x0, 0x0, 0x1}) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000240000000000000000000000010000150000a70000005f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x42, 0x3}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000140)=""/106, 0x2d, 0x6a, 0x0, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x20, &(0x7f0000000380)={&(0x7f00000001c0)=""/168, 0xa8, 0x0, &(0x7f0000000280)=""/224, 0xe0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r0, 0x20, &(0x7f0000000480)={&(0x7f0000000400)=""/49, 0x31, 0x0, &(0x7f0000000440)=""/41, 0x29}}, 0x10) 00:15:18 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x12, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfac}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x2, 0x1, 0x2, 0x6, 0xfffffffffffffffc}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0xdc, &(0x7f0000000480)=""/220, 0x41000, 0x41, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r3], 0x0, 0x10, 0x1ff}, 0x90) 00:15:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000240000000000000000000000010000150000a70000005f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x42, 0x3}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000140)=""/106, 0x2d, 0x6a, 0x0, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x20, &(0x7f0000000380)={&(0x7f00000001c0)=""/168, 0xa8, 0x0, &(0x7f0000000280)=""/224, 0xe0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r0, 0x20, &(0x7f0000000480)={&(0x7f0000000400)=""/49, 0x31, 0x0, &(0x7f0000000440)=""/41, 0x29}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r0, 0x20, &(0x7f0000000480)={&(0x7f0000000400)=""/49, 0x31, 0x0, &(0x7f0000000440)=""/41, 0x29}}, 0x10) 00:15:18 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) 00:15:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000014010000140100000500000f03000000030000001f000000ff7f0000040000000800000000800000040000000900000004000000040000000000000081000000030400007f000005ffffffff39d8bf0d0000000000000a050000000000000000000003000000000300000005000000ff0700000001000000020000000000000100000000180028000d00000000000009000000000800000000000800000000000007f57a82184eee6bd20000000900000009000000050000000200000003000000040000006a000000030000000500000005000000000100000500000005000000090000000400000002000000ff0700000200000008000000ff7f0000cd00005f2e306161305f00"/310], &(0x7f0000000280)=""/97, 0x136, 0x61, 0x1, 0x3}, 0x20) r0 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x6f73}}, @volatile={0x7, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/211, 0x3f, 0xd3, 0x1, 0x5}, 0x20) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3ff) ioctl$NBD_DO_IT(r0, 0xab03) r2 = syz_open_dev$ndb(&(0x7f0000002580), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000240000000000000000000000010000150000a70000005f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000240000000000000000000000010000150000a70000005f00"/56], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@int={0xb, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x42, 0x3}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000140)=""/106, 0x2d, 0x6a, 0x0, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x20, &(0x7f0000000380)={&(0x7f00000001c0)=""/168, 0xa8, 0x0, &(0x7f0000000280)=""/224, 0xe0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r0, 0x20, &(0x7f0000000480)={&(0x7f0000000400)=""/49, 0x31, 0x0, &(0x7f0000000440)=""/41, 0x29}}, 0x10) 00:15:18 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x9, 0x2, [0x9, 0x1f]}, &(0x7f00000000c0)=0xc) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000280)=0x370, 0x4) write$FUSE_INIT(r2, &(0x7f00000023c0)={0x50, 0x0, r3, {0x7, 0x27, 0x7, 0x40001, 0x9, 0x2fb, 0x7, 0x7fffffff}}, 0x50) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={r0, 0x80, 0x4000001, 0x651, 0x8, 0x1000, 0x7, 0x0, {r1, @in={{0x2, 0x4e21, @multicast2}}, 0x2, 0x2, 0x7, 0x100, 0x1f}}, &(0x7f00000001c0)=0xb0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) sendto$packet(r6, &(0x7f0000000200)="8730f53effffea5c54ac5a4749c1eec90a1a16db362d8cc74d37db21de78eb98be0ffea27c7c26f4a965a8039339be45", 0x30, 0x10, 0x0, 0x0) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r3, 0x107, 0x2, 0x0, 0x0) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x9, 0x2, [0x9, 0x1f]}, &(0x7f00000000c0)=0xc) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000280)=0x370, 0x4) write$FUSE_INIT(r2, &(0x7f00000023c0)={0x50, 0x0, r3, {0x7, 0x27, 0x7, 0x40001, 0x9, 0x2fb, 0x7, 0x7fffffff}}, 0x50) (async) write$FUSE_INIT(r2, &(0x7f00000023c0)={0x50, 0x0, r3, {0x7, 0x27, 0x7, 0x40001, 0x9, 0x2fb, 0x7, 0x7fffffff}}, 0x50) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={r0, 0x80, 0x4000001, 0x651, 0x8, 0x1000, 0x7, 0x0, {r1, @in={{0x2, 0x4e21, @multicast2}}, 0x2, 0x2, 0x7, 0x100, 0x1f}}, &(0x7f00000001c0)=0xb0) (async) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={r0, 0x80, 0x4000001, 0x651, 0x8, 0x1000, 0x7, 0x0, {r1, @in={{0x2, 0x4e21, @multicast2}}, 0x2, 0x2, 0x7, 0x100, 0x1f}}, &(0x7f00000001c0)=0xb0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) sendto$packet(r6, &(0x7f0000000200)="8730f53effffea5c54ac5a4749c1eec90a1a16db362d8cc74d37db21de78eb98be0ffea27c7c26f4a965a8039339be45", 0x30, 0x10, 0x0, 0x0) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) (async) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x9, 0x2, [0x9, 0x1f]}, &(0x7f00000000c0)=0xc) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) (async) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000280)=0x370, 0x4) (async) write$FUSE_INIT(r2, &(0x7f00000023c0)={0x50, 0x0, r3, {0x7, 0x27, 0x7, 0x40001, 0x9, 0x2fb, 0x7, 0x7fffffff}}, 0x50) (async) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={r0, 0x80, 0x4000001, 0x651, 0x8, 0x1000, 0x7, 0x0, {r1, @in={{0x2, 0x4e21, @multicast2}}, 0x2, 0x2, 0x7, 0x100, 0x1f}}, &(0x7f00000001c0)=0xb0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) (async) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xe) (async) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) (async) sendto$packet(r6, &(0x7f0000000200)="8730f53effffea5c54ac5a4749c1eec90a1a16db362d8cc74d37db21de78eb98be0ffea27c7c26f4a965a8039339be45", 0x30, 0x10, 0x0, 0x0) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0xffffffff, 0x90}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0x1}]}]}}, &(0x7f0000000000)=""/33, 0x36, 0x21, 0x1}, 0x20) 00:15:18 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x2b3}, &(0x7f0000000880), &(0x7f00000008c0)) 00:15:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000300)=[{0x1, 0x3, 0x3}, {0x3, 0x5, 0x8}], 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:19 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, 0x0, 0x0) 00:15:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0x1}]}]}}, &(0x7f0000000000)=""/33, 0x36, 0x21, 0x1}, 0x20) 00:15:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 00:15:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0xc}, {0x1}]}]}}, &(0x7f0000000000)=""/33, 0x36, 0x21, 0x1}, 0x20) 00:15:19 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800), &(0x7f0000000880), &(0x7f00000008c0)) 00:15:19 executing program 2: sendmsg$NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000011}, 0x1) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x7fff, 0x2, r1}}}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000400000000000000020000060400000002000000000000000100000000000000005f5f00c131c603bb70e3c4cdf829cbfff235f165c80467f6735395b144d9b143d166b917815dd71af5d789451a9e9311235eaea6a66633448396102c539567c5271c2e254aa35ce60716ffae00166ce4060763baba2c053f75ddbaf60e67710d1317d2315615c9cab4d241bc7f8bbb676fa90847be833e9c816c08be04b885dc95ddf7ab378a292c0e49fe999d98b30e349f151af06647fdf00f6c5fef96128410ce8f273994d8a67ef32a015338c74344edb5a02b5fc6d566ad"], &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) openat$cuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) [ 919.103463][T13220] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 919.116255][T13220] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 919.118625][T13220] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 919.131717][T13220] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 [ 919.149450][T13220] Bluetooth: hci12: unexpected cc 0x0c25 length: 249 > 3 00:15:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x2}, {0x1}]}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000000c0)=""/27, 0x38, 0x1b, 0x1}, 0x20) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 00:15:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0}, 0x90) setsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f0000000400)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, 0x0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) [ 919.157853][T13220] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 00:15:19 executing program 5: syz_io_uring_setup(0x5090, &(0x7f0000000800), 0x0, &(0x7f00000008c0)) [ 919.199439][T13220] Bluetooth: hci13: unexpected cc 0x0c03 length: 249 > 1 [ 919.202904][T13220] Bluetooth: hci13: unexpected cc 0x1003 length: 249 > 9 [ 919.215659][T13220] Bluetooth: hci13: unexpected cc 0x1001 length: 249 > 9 [ 919.220528][T13220] Bluetooth: hci13: unexpected cc 0x0c23 length: 249 > 4 [ 919.222642][T13220] Bluetooth: hci13: unexpected cc 0x0c25 length: 249 > 3 [ 919.234263][T13220] Bluetooth: hci13: unexpected cc 0x0c38 length: 249 > 2 [ 919.338010][ T1720] chnl_net:caif_netlink_parms(): no params data found [ 919.369538][ T1738] chnl_net:caif_netlink_parms(): no params data found [ 919.412749][ T1720] bridge0: port 1(bridge_slave_0) entered blocking state [ 919.414564][ T1720] bridge0: port 1(bridge_slave_0) entered disabled state [ 919.416269][ T1720] bridge_slave_0: entered allmulticast mode [ 919.418155][ T1720] bridge_slave_0: entered promiscuous mode [ 919.434720][ T1720] bridge0: port 2(bridge_slave_1) entered blocking state [ 919.436530][ T1720] bridge0: port 2(bridge_slave_1) entered disabled state [ 919.438173][ T1720] bridge_slave_1: entered allmulticast mode [ 919.440251][ T1720] bridge_slave_1: entered promiscuous mode [ 919.465231][ T1720] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 919.469333][ T1720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 919.496210][ T1738] bridge0: port 1(bridge_slave_0) entered blocking state [ 919.497937][ T1738] bridge0: port 1(bridge_slave_0) entered disabled state [ 919.499696][ T1738] bridge_slave_0: entered allmulticast mode [ 919.501743][ T1738] bridge_slave_0: entered promiscuous mode [ 919.505874][ T1738] bridge0: port 2(bridge_slave_1) entered blocking state [ 919.507597][ T1738] bridge0: port 2(bridge_slave_1) entered disabled state [ 919.509307][ T1738] bridge_slave_1: entered allmulticast mode [ 919.511226][ T1738] bridge_slave_1: entered promiscuous mode [ 919.515792][ T1720] team0: Port device team_slave_0 added [ 919.524403][ T1720] team0: Port device team_slave_1 added [ 919.541615][ T1720] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 919.547316][ T1720] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 919.553471][ T1720] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 919.557511][ T1720] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 919.559180][ T1720] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 919.565912][ T1720] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 919.571028][ T1738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 919.573586][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 105 seconds [ 919.584262][ T1738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 919.625244][ T1720] hsr_slave_0: entered promiscuous mode [ 919.653688][ T1720] hsr_slave_1: entered promiscuous mode [ 919.693237][ T1720] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 919.695099][ T1720] Cannot create hsr debugfs directory [ 919.712911][ T1738] team0: Port device team_slave_0 added [ 919.716351][ T1738] team0: Port device team_slave_1 added [ 919.745466][ T1738] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 919.746988][ T1738] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 919.752596][ T1738] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 919.772827][ T1738] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 919.774943][ T1738] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 919.784315][ T1738] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 919.846416][ T1720] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.895181][ T1738] hsr_slave_0: entered promiscuous mode [ 919.950628][ T1738] hsr_slave_1: entered promiscuous mode [ 919.973210][ T1738] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 919.974931][ T1738] Cannot create hsr debugfs directory [ 920.019023][ T1720] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.090541][ T1720] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.207151][ T1720] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.378642][ T1738] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.446410][ T1738] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.544842][ T1738] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.625384][ T1738] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.791675][ T1738] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 920.825547][ T1738] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 920.872578][ T1738] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 920.933293][ T1738] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 921.028160][ T1720] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 921.065914][ T1720] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 921.106624][ T1720] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 921.163175][ T1720] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 921.219514][ T1738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 921.224112][T13807] Bluetooth: hci12: command 0x0409 tx timeout [ 921.234804][ T1738] 8021q: adding VLAN 0 to HW filter on device team0 [ 921.245352][ T3242] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.246938][ T3242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 921.254675][T27379] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.256356][T27379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.300402][ T1720] 8021q: adding VLAN 0 to HW filter on device bond0 [ 921.305678][T13807] Bluetooth: hci13: command 0x0409 tx timeout [ 921.315682][ T1720] 8021q: adding VLAN 0 to HW filter on device team0 [ 921.321078][T27379] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.322650][T27379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 921.334016][T27379] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.335680][T27379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.392747][ T1738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 921.430942][ T1738] veth0_vlan: entered promiscuous mode [ 921.437769][ T1738] veth1_vlan: entered promiscuous mode [ 921.465136][ T1720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 921.481393][ T1738] veth0_macvtap: entered promiscuous mode [ 921.491322][ T1738] veth1_macvtap: entered promiscuous mode [ 921.502095][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.505129][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.507335][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.509669][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.511991][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.515082][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.517274][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.519513][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.523670][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.525904][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.528177][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.530507][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.532702][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.535852][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.538070][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.540560][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.542843][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.546552][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.548789][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.551031][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.553784][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.556184][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.558365][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.560685][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.564857][ T1738] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 921.568863][ T1720] veth0_vlan: entered promiscuous mode [ 921.582871][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.585445][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.587727][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.590113][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.592386][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.595819][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.598155][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.600474][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.602604][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.606310][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.608539][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.610862][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.613850][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.616343][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.618428][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.620871][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.623016][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.627802][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.630102][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.632397][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.635526][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.637881][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.640206][ T1738] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.642521][ T1738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.646532][ T1738] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 921.650205][ T1738] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.652178][ T1738] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.655948][ T1738] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.657926][ T1738] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.675558][ T1720] veth1_vlan: entered promiscuous mode [ 921.715952][ T1720] veth0_macvtap: entered promiscuous mode [ 921.734996][ T1720] veth1_macvtap: entered promiscuous mode [ 921.754451][T29058] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 921.756263][T29058] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 921.757457][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.760380][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.762561][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.765179][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.767430][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.769908][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.772434][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.775507][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.777812][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.780336][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.782568][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.785766][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.788219][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.790535][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.792740][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.796088][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.798307][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.800701][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.802849][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.805528][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.807785][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.810266][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.812490][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.815157][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.817401][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 921.819733][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.823656][ T1720] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 921.845248][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.847637][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.849704][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.852109][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.855509][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.857950][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.860196][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.862584][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.865246][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.867805][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.869968][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.872213][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.874939][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.877395][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.879565][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.881905][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.885020][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.887317][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.889525][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.891819][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.895180][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.897487][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.899635][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.902002][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.904339][ T1720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 921.906612][ T1720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 921.910055][ T1720] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 921.916997][ T1720] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.918876][ T1720] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.920838][ T1720] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.922783][ T1720] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 921.926877][T29058] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 921.929209][T29058] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 921.973442][T31631] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 921.975264][T31631] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 922.001279][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 922.006406][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 923.303268][T13807] Bluetooth: hci12: command 0x041b tx timeout [ 923.383487][T13807] Bluetooth: hci13: command 0x041b tx timeout [ 924.664054][ T2224] ieee802154 phy0 wpan0: encryption failed: -22 [ 924.665524][ T2224] ieee802154 phy1 wpan1: encryption failed: -22 [ 925.383336][T13807] Bluetooth: hci12: command 0x040f tx timeout [ 925.463844][T13807] Bluetooth: hci13: command 0x040f tx timeout [ 925.953714][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 110 seconds [ 927.463872][T13807] Bluetooth: hci12: command 0x0419 tx timeout [ 927.544290][T13807] Bluetooth: hci13: command 0x0419 tx timeout [ 932.343889][ T81] block nbd1: Possible stuck request 00000000dd63df83: control (read@0,512B). Runtime 115 seconds [ 936.184364][ T29] INFO: task syz-executor.1:402 blocked for more than 143 seconds. [ 936.186361][ T29] Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 936.187987][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 936.190091][ T29] task:syz-executor.1 state:D stack:0 pid:402 tgid:399 ppid:6124 flags:0x0000000d [ 936.192438][ T29] Call trace: [ 936.197930][ T29] __switch_to+0x314/0x560 [ 936.199027][ T29] __schedule+0x1354/0x2360 [ 936.200083][ T29] schedule+0xb8/0x19c [ 936.201062][ T29] schedule_preempt_disabled+0x18/0x2c [ 936.202386][ T29] __mutex_lock_common+0xbd8/0x21a0 [ 936.203760][ T29] mutex_lock_nested+0x2c/0x38 [ 936.204882][ T29] blkdev_put+0xec/0x740 [ 936.205847][ T29] bdev_release+0x5c/0x78 [ 936.206823][ T29] blkdev_release+0x40/0x54 [ 936.207881][ T29] __fput+0x308/0x8e4 [ 936.208949][ T29] ____fput+0x20/0x30 [ 936.209995][ T29] task_work_run+0x230/0x2e0 [ 936.211046][ T29] get_signal+0x13f4/0x15ec [ 936.212084][ T29] do_notify_resume+0x3bc/0x393c [ 936.213637][ T29] el0_svc+0x9c/0x158 [ 936.214619][ T29] el0t_64_sync_handler+0x84/0xfc [ 936.215701][ T29] el0t_64_sync+0x190/0x194 [ 936.216696][ T29] INFO: task syz-executor.1:424 blocked for more than 143 seconds. [ 936.218467][ T29] Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 936.220096][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 936.222020][ T29] task:syz-executor.1 state:D stack:0 pid:424 tgid:399 ppid:6124 flags:0x00000005 [ 936.224879][ T29] Call trace: [ 936.225631][ T29] __switch_to+0x314/0x560 [ 936.226612][ T29] __schedule+0x1354/0x2360 [ 936.227629][ T29] schedule+0xb8/0x19c [ 936.228560][ T29] schedule_preempt_disabled+0x18/0x2c [ 936.229828][ T29] __mutex_lock_common+0xbd8/0x21a0 [ 936.231095][ T29] mutex_lock_nested+0x2c/0x38 [ 936.232193][ T29] blkdev_get_by_dev+0x114/0x55c [ 936.233933][ T29] bdev_open_by_dev+0x84/0x144 [ 936.235086][ T29] blkdev_open+0x134/0x33c [ 936.236086][ T29] do_dentry_open+0x778/0x12b4 [ 936.237156][ T29] vfs_open+0x7c/0x90 [ 936.238148][ T29] path_openat+0x1f6c/0x2888 [ 936.239144][ T29] do_filp_open+0x1bc/0x3cc [ 936.240161][ T29] do_sys_openat2+0x124/0x1b8 [ 936.241238][ T29] __arm64_sys_openat+0x1f0/0x240 [ 936.242403][ T29] invoke_syscall+0x98/0x2b8 [ 936.244290][ T29] el0_svc_common+0x130/0x23c [ 936.245367][ T29] do_el0_svc+0x48/0x58 [ 936.246285][ T29] el0_svc+0x54/0x158 [ 936.247195][ T29] el0t_64_sync_handler+0x84/0xfc [ 936.248323][ T29] el0t_64_sync+0x190/0x194 [ 936.249363][ T29] INFO: task syz-executor.0:454 blocked for more than 143 seconds. [ 936.251099][ T29] Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 936.252579][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 936.254758][ T29] task:syz-executor.0 state:D stack:0 pid:454 tgid:450 ppid:6121 flags:0x0000000d [ 936.257064][ T29] Call trace: [ 936.257836][ T29] __switch_to+0x314/0x560 [ 936.258884][ T29] __schedule+0x1354/0x2360 [ 936.259924][ T29] schedule+0xb8/0x19c [ 936.260864][ T29] schedule_preempt_disabled+0x18/0x2c [ 936.262164][ T29] __mutex_lock_common+0xbd8/0x21a0 [ 936.263882][ T29] mutex_lock_nested+0x2c/0x38 [ 936.265048][ T29] blkdev_put+0xec/0x740 [ 936.266086][ T29] bdev_release+0x5c/0x78 [ 936.269164][ T29] blkdev_release+0x40/0x54 [ 936.270261][ T29] __fput+0x308/0x8e4 [ 936.271106][ T29] ____fput+0x20/0x30 [ 936.272088][ T29] task_work_run+0x230/0x2e0 [ 936.273314][ T29] do_notify_resume+0x214c/0x393c [ 936.274538][ T29] el0_svc+0x9c/0x158 [ 936.275560][ T29] el0t_64_sync_handler+0x84/0xfc [ 936.276758][ T29] el0t_64_sync+0x190/0x194 [ 936.277863][ T29] INFO: task syz-executor.0:476 blocked for more than 143 seconds. [ 936.279673][ T29] Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 936.281319][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 936.284002][ T29] task:syz-executor.0 state:D stack:0 pid:476 tgid:450 ppid:6121 flags:0x00000005 [ 936.286355][ T29] Call trace: [ 936.287202][ T29] __switch_to+0x314/0x560 [ 936.288310][ T29] __schedule+0x1354/0x2360 [ 936.289355][ T29] schedule+0xb8/0x19c [ 936.290285][ T29] schedule_preempt_disabled+0x18/0x2c [ 936.291552][ T29] __mutex_lock_common+0xbd8/0x21a0 [ 936.292720][ T29] mutex_lock_nested+0x2c/0x38 [ 936.294796][ T29] blkdev_get_by_dev+0x114/0x55c [ 936.295957][ T29] bdev_open_by_dev+0x84/0x144 [ 936.297082][ T29] blkdev_open+0x134/0x33c [ 936.298128][ T29] do_dentry_open+0x778/0x12b4 [ 936.299246][ T29] vfs_open+0x7c/0x90 [ 936.300212][ T29] path_openat+0x1f6c/0x2888 [ 936.301215][ T29] do_filp_open+0x1bc/0x3cc [ 936.302281][ T29] do_sys_openat2+0x124/0x1b8 [ 936.304936][ T29] __arm64_sys_openat+0x1f0/0x240 [ 936.306173][ T29] invoke_syscall+0x98/0x2b8 [ 936.307248][ T29] el0_svc_common+0x130/0x23c [ 936.308365][ T29] do_el0_svc+0x48/0x58 [ 936.309269][ T29] el0_svc+0x54/0x158 [ 936.310193][ T29] el0t_64_sync_handler+0x84/0xfc [ 936.311304][ T29] el0t_64_sync+0x190/0x194 [ 936.312347][ T29] [ 936.312347][ T29] Showing all locks held in the system: [ 936.314331][ T29] 1 lock held by khungtaskd/29: [ 936.315379][ T29] #0: ffff80008e6c48c0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0xc/0x44 [ 936.317511][ T29] 2 locks held by getty/5866: [ 936.318578][ T29] #0: ffff0000d2dfc0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 936.320777][ T29] #1: ffff800094e502f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x41c/0x1228 [ 936.323262][ T29] 3 locks held by kworker/u4:35/31629: [ 936.324539][ T29] #0: ffff0001b4166d98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x2dc/0x2360 [ 936.326680][ T29] #1: ffff0001b4152e48 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x3c0/0x618 [ 936.329415][ T29] #2: ffff0001b4153d58 (&base->lock){-.-.}-{2:2}, at: __mod_timer+0x6e0/0xd2c [ 936.331545][ T29] 1 lock held by udevd/31971: [ 936.332694][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.335125][ T29] 1 lock held by syz-executor.1/402: [ 936.336323][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_put+0xec/0x740 [ 936.338594][ T29] 1 lock held by syz-executor.1/424: [ 936.339757][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.342242][ T29] 1 lock held by syz-executor.0/454: [ 936.343547][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_put+0xec/0x740 [ 936.345767][ T29] 1 lock held by syz-executor.0/476: [ 936.346977][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.349383][ T29] 1 lock held by udevd/464: [ 936.350445][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.352779][ T29] 1 lock held by syz-executor.0/853: [ 936.354144][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.356583][ T29] 1 lock held by syz-executor.0/854: [ 936.357821][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.360218][ T29] 1 lock held by syz-executor.1/857: [ 936.361442][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.363812][ T29] 1 lock held by syz-executor.1/858: [ 936.364994][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.367199][ T29] 1 lock held by syz-executor.1/1170: [ 936.368449][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.371892][ T29] 1 lock held by syz-executor.1/1173: [ 936.373277][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.375720][ T29] 1 lock held by syz-executor.0/1172: [ 936.376916][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.379260][ T29] 1 lock held by syz-executor.0/1174: [ 936.380471][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.382760][ T29] 1 lock held by syz-executor.0/1457: [ 936.384052][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.386398][ T29] 1 lock held by syz-executor.0/1460: [ 936.387609][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.389874][ T29] 1 lock held by syz-executor.1/1459: [ 936.391097][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.393468][ T29] 1 lock held by syz-executor.1/1461: [ 936.394551][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.396810][ T29] 1 lock held by syz-executor.1/1770: [ 936.398083][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.400361][ T29] 1 lock held by syz-executor.1/1773: [ 936.401580][ T29] #0: ffff0000ca8cb4c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.404007][ T29] 1 lock held by syz-executor.0/1772: [ 936.405294][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.407560][ T29] 1 lock held by syz-executor.0/1774: [ 936.408689][ T29] #0: ffff0000ca8764c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0x114/0x55c [ 936.411072][ T29] [ 936.411660][ T29] ============================================= [ 936.411660][ T29] [ 936.413710][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 936.415311][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 [ 936.417417][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 936.419696][ T29] Call trace: [ 936.420443][ T29] dump_backtrace+0x1b8/0x1e4 [ 936.421500][ T29] show_stack+0x2c/0x3c [ 936.422313][ T29] dump_stack_lvl+0xd0/0x124 [ 936.423381][ T29] dump_stack+0x1c/0x28 [ 936.424401][ T29] panic+0x30c/0x88c [ 936.425329][ T29] hung_task_panic+0x0/0x2c [ 936.426391][ T29] kthread+0x288/0x310 [ 936.427324][ T29] ret_from_fork+0x10/0x20 [ 936.428360][ T29] SMP: stopping secondary CPUs [ 936.429503][ T29] Kernel Offset: disabled [ 936.430538][ T29] CPU features: 0x0,00000020,7002004a,21017203 [ 936.431902][ T29] Memory Limit: none [ 937.442216][ T29] Rebooting in 86400 seconds..