(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:26:15 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:15 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(0xffffffffffffffff, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {0x0, 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:15 executing program 6: r0 = getpid() socketpair(0x5, 0x4, 0x9, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x1d}, @void, @val={0xc, 0x99, {0x8, 0x3f}}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x35}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x12}, @NL80211_ATTR_PID={0x8, 0x52, r0}]}, 0x44}}, 0x2) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:26:15 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, 0x0) [ 1711.853310] syz-executor.2[40914]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1711.872109] ieee802154 phy0 wpan0: encryption failed: -22 01:26:15 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {0x0, 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:15 executing program 0: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x8, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:26:15 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40), 0x0, 0x0) r1 = getpid() pidfd_open(r1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x680300, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = dup(r6) preadv(r3, &(0x7f0000000640)=[{&(0x7f0000000380)=""/140, 0x8c}, {&(0x7f0000000440)=""/5, 0x5}, {&(0x7f0000000480)=""/22, 0x16}, {&(0x7f00000004c0)=""/66, 0x42}, {&(0x7f0000000540)=""/100, 0x64}, {&(0x7f00000005c0)=""/54, 0x36}], 0x6, 0x6000000, 0x3) sendfile(r7, r5, 0x0, 0x10000027f) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f0000000340)={r4, r7}) [ 1712.149649] syz-executor.2[41139]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:26:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {0x0, 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:32 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:32 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:32 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:32 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000001c80)=""/4106, 0x100a}], 0x1, 0x0) 01:26:32 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x10000027f) r3 = perf_event_open(0x0, 0x0, 0x6, r0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x240f, 0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000280)={{0x1, 0x1, 0x18, r3, {0x1}}, './file1\x00'}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x10000) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r5 = gettid() ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, @out_args}, './file1\x00'}) openat(r6, &(0x7f0000000240)='./file1\x00', 0x4400, 0x102) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x8, 0x4, 0x2, 0x0, 0x643, 0x40004, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8, 0x9}, 0x8000, 0x5, 0x200, 0x1, 0x7, 0x7ff, 0x7, 0x0, 0x9291, 0x0, 0x80000000}, r5, 0xc, r4, 0x2) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = dup(r7) sendfile(r8, 0xffffffffffffffff, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0xee00) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:26:32 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, 0x0) 01:26:32 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1728.879634] ieee802154 phy0 wpan0: encryption failed: -22 01:26:32 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1728.912301] syz-executor.2[41264]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:26:32 executing program 6: getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000100), &(0x7f0000000140)=0x4) r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:26:51 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:51 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0)}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:51 executing program 6: getpid() 01:26:51 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0xff, 0x0, 0x8, 0x7f, 0x0, 0x10000, 0x10208, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x4, 0x5}, 0x50020, 0x37c1, 0xc1, 0x7, 0x7d, 0xd7, 0xff, 0x0, 0x4, 0x0, 0x92b}, 0xffffffffffffffff, 0xd, r0, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:26:51 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:51 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:26:51 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1747.403998] ieee802154 phy0 wpan0: encryption failed: -22 [ 1747.475195] syz-executor.2[41394]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:26:51 executing program 6: r0 = getpid() recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)=[{{&(0x7f00000004c0), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000640)=""/199, 0xc7}, {&(0x7f0000000540)=""/33, 0x21}, {&(0x7f0000000740)=""/173, 0xad}, {&(0x7f0000000dc0)=""/196, 0xc4}, {&(0x7f0000000580)=""/90, 0x5a}], 0x5, &(0x7f0000000980)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0xb3}}, {{&(0x7f0000000a00), 0x6e, &(0x7f0000000a80), 0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14ff010000b2272e0357d0b7de000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xf0}}], 0x2, 0x40000100, &(0x7f0000000c40)={0x0, 0x3938700}) r2 = getpid() pidfd_open(r2, 0x0) clone3(&(0x7f0000000cc0)={0x100, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000340), {0xe}, &(0x7f0000000380)=""/41, 0x29, &(0x7f00000003c0)=""/229, &(0x7f0000000c80)=[r1, r2, r0], 0x3}, 0x58) r3 = gettid() rt_tgsigqueueinfo(r1, r3, 0x2a, &(0x7f0000000d40)={0x3c, 0x4, 0x90a}) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/241, 0xf1}, {&(0x7f0000000100)=""/211, 0xfb}, {&(0x7f0000000280)=""/129, 0x81}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000001c80)=""/4098, 0x1000}], 0x1, 0x0) 01:26:51 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1747.586554] ieee802154 phy0 wpan0: encryption failed: -22 01:26:51 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/175, 0xaf}, {&(0x7f0000000100)=""/110, 0x6e}], 0x2, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/82, 0x52}, {&(0x7f00000004c0)=""/50, 0x32}, {&(0x7f0000000500)=""/187, 0xbb}], 0x3, 0x0) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) fork() 01:26:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0x1d, r0, &(0x7f0000000300)=""/4096, 0x1000) add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="20b6505fbc8f2c9d618fc3d9b1a83244518cf7212c488aec9496d2b74c620d87726e3d0bb1e6d794f814b1c944bcbd04665b51db7827ee45241eb8fbbe1b8ef9a1724f9e9fdb74b0b3a67ad9919801f5b1e006d7aeabca8f49b63527c0f1c2fde896fcc01857ec9988fe2b95d8a861e7ceb7de6c27bfbbc23bef123e6626ab816c056c37e87db540da1036bc8842f86d0e7b6d985aabc97323ce8fdb6b53a0807957bf220f99715e93191e2919abd02b8c9b58dafb265d984e338341f50da49b0c6c3844e98d84e4dbaa1fc130b987a976a1916ebed81908527b6a68618f13f2963ea0", 0xe3, r0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x59}}, './file1\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x2, 0xffffffffffffffff, 0x1ff}, 0x0, 0x0, r1, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 01:26:51 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) ptrace$getsig(0x4202, r1, 0xb69d, &(0x7f0000000100)) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) getpid() 01:26:51 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:51 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:26:51 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x15, &(0x7f0000000800)={0x10, 0x6, 0xfffffff8}) process_vm_writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/105, 0x69}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0x2, &(0x7f0000000580)=[{&(0x7f0000000380)=""/140, 0x8c}, {&(0x7f0000000440)=""/152, 0x98}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000640)=""/204, 0xcc}, {&(0x7f0000000740)=""/190, 0xbe}], 0x5, 0x0) [ 1747.857196] ieee802154 phy0 wpan0: encryption failed: -22 01:27:06 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) utime(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x7fffffff, 0x100000000}) r2 = syz_open_dev$vcsa(&(0x7f0000000280), 0x3, 0x24140) fchmodat(r2, &(0x7f00000002c0)='./file1/../file0\x00', 0x82) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) getpgid(0xffffffffffffffff) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, 0x0, 0x10000027f) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x5, 0x3, 0x9, 0x0, 0x31, 0x92ba, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000340), 0x4}, 0x402, 0x9, 0x1, 0x8, 0x8, 0xa, 0x200, 0x0, 0x3, 0x0, 0x200}, 0xffffffffffffffff, 0xd, r3, 0x8) pwrite64(r3, &(0x7f0000000140)="7e8dfbb19b3fc37822a3f0c5cd2e7d4714b4df7b15866ba47fe9d4a9c8e31cb2d74e8be68ded154bcced5483d41ae1687372fdc292ab02696360eadbf856c6f86d5ba5382608dd106bc8c1f2d06469da8c154cc4e778b50db71a6b5972a1e086a897d4f9790455f1da5418f9117e9c91e96ef442211df8f8ad9584648a61f89bd657961e55c417d7b2", 0x89, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) mknodat(r3, &(0x7f0000000300)='./file1/../file0\x00', 0x200, 0x2) 01:27:06 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:06 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:06 executing program 6: r0 = getpid() process_vm_writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/182, 0xb6}], 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/71, 0x47}, {&(0x7f0000000180)=""/142, 0x8e}], 0x2, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000600), 0x0, &(0x7f0000001c40), 0x0, 0x0) 01:27:06 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0)}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:06 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:06 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1762.755826] ieee802154 phy0 wpan0: encryption failed: -22 01:27:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000050}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000300)={0x89f, 0x9, 0x0, 0x9, 0x4, [{0x7c, 0xb, 0x3, '\x00', 0xa84}, {0x0, 0x4, 0xffffffff}, {0x4, 0x0, 0x10000, '\x00', 0x1}, {0x1800000000000, 0x400, 0xfffffffffffffffc, '\x00', 0x1c86}]}) sendfile(r1, r0, &(0x7f0000000000), 0x6c) [ 1762.830989] syz-executor.2[41995]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:27:06 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000340)=""/223, 0xdf}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) rt_tgsigqueueinfo(r1, r2, 0x23, &(0x7f0000000100)={0x3f, 0x40, 0x8}) 01:27:06 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$nl_xfrm(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)=ANY=[@ANYBLOB="300000001d00010028bd7000fddbdf2508000b00010100000a0010"], 0x30}}, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$dupfd(r2, 0x0, r2) r3 = fork() ptrace$poke(0x5, r3, &(0x7f00000001c0), 0x99) r4 = fork() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x8}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1/file0\x00', 0x404142, 0xc5) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000000)={0x2b1, 0xffffffff}) 01:27:06 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = getpid() pidfd_open(r1, 0x0) waitid(0x1, r1, &(0x7f0000000640), 0x8, &(0x7f0000001a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000007c0)=0xc) capset(&(0x7f0000000800)={0x20080522, r2}, &(0x7f0000000840)={0x200, 0xfffffff8, 0x3, 0x6e, 0x6, 0x7fffffff}) r3 = getpid() pidfd_open(r3, 0x0) capset(&(0x7f00000006c0)={0x19980330, r3}, &(0x7f0000000700)={0x7, 0x8001, 0x2, 0x7, 0x9}) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x60) r5 = getpid() pidfd_open(r5, 0x0) wait4(r2, 0x0, 0x80000000, &(0x7f0000001b40)) capset(&(0x7f0000000400)={0x19980330, r5}, &(0x7f0000000440)={0xffff2fd6, 0x8, 0xece, 0xf69, 0x200, 0x80000000}) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000340)=""/155, 0x9b}, {&(0x7f0000000880)=""/102, 0x66}, {&(0x7f0000000480)=""/101, 0x65}, {&(0x7f0000001940)=""/264, 0x108}, {&(0x7f0000000500)=""/225, 0xe1}], 0x5, 0x0, 0x8) 01:27:06 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:06 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1763.457517] ieee802154 phy0 wpan0: encryption failed: -22 01:27:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() pidfd_open(r0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, 0x0, 0x10000027f) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x7, 0x2, 0x1, 0x0, 0x3f, 0x20004, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0x4, 0xfffffffffffffffb}, 0x10, 0xffff, 0x2, 0x5, 0xfffffffffffffffd, 0x101, 0x6, 0x0, 0x100, 0x0, 0x3}, r0, 0x0, r3, 0xb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000000)={0x1f, 0x0, 0x431, 0x5, 0x1, 0xf7}) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:27:07 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) process_vm_writev(r1, &(0x7f0000000380)=[{&(0x7f0000000100)=""/90, 0x5a}, {&(0x7f0000000340)=""/36, 0x24}], 0x2, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/120, 0x78}, {&(0x7f0000000440)=""/45, 0x2d}, {&(0x7f0000000480)=""/104, 0xffffffffffffffea}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000000640)=""/164, 0xa4}, {&(0x7f0000000700)}], 0x7, 0x0) r2 = getpid() pidfd_open(r2, 0x0) process_vm_writev(r2, &(0x7f0000001940)=[{&(0x7f0000000700)=""/40, 0x28}, {&(0x7f00000007c0)=""/113, 0x71}, {&(0x7f0000000840)=""/207, 0xcf}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=[{&(0x7f0000001980)=""/77, 0x4d}, {&(0x7f0000001a00)=""/246, 0xf6}], 0x2, 0x0) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 1763.519235] EXT4-fs warning (device sda): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 1763.529037] EXT4-fs warning (device sda): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed 01:27:25 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618", 0x2, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x10001) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:27:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0)}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:25 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:25 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = getpid() pidfd_open(r1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long}, 0x11) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x3) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000005c0)=0x0) rt_tgsigqueueinfo(r0, r3, 0x0, &(0x7f0000000640)={0x3, 0x9, 0x4}) preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000400)=""/101, 0x65}, {&(0x7f0000000140)=""/31, 0x1f}, {&(0x7f0000000480)=""/205, 0xcd}], 0x4, 0x3ff, 0x6) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) pidfd_open(r1, 0x0) 01:27:25 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:25 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:25 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x0, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1781.910895] ieee802154 phy0 wpan0: encryption failed: -22 01:27:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) stat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000140)) creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 1781.936516] ieee802154 phy0 wpan0: encryption failed: -22 [ 1781.961552] syz-executor.2[42553]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:27:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x1f}}, './file1\x00'}) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:27:25 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618", 0x2, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 1782.321386] ieee802154 phy0 wpan0: encryption failed: -22 01:27:26 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x0, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:26 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) syz_io_uring_setup(0x3fd7, &(0x7f0000000140)={0x0, 0x713e, 0x2, 0x0, 0x8000241, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) syz_io_uring_submit(r2, 0x0, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={r3, r4+10000000}, 0x1, 0x1}, 0x6) r5 = perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000050}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$EXT4_IOC_GET_ES_CACHE(r5, 0xc020662a, &(0x7f0000000300)={0x89f, 0x9, 0x0, 0x9, 0x4, [{0x7c, 0xb, 0x3, '\x00', 0xa84}, {0x0, 0x4, 0xffffffff}, {0x4, 0x0, 0x10000, '\x00', 0x1}, {0x1800000000000, 0x400, 0xfffffffffffffffc, '\x00', 0x1c86}]}) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x2, 0x7, 0x6, 0x2, 0x0, 0x2, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0xffff, 0xff}, 0xe201, 0x1, 0x3eb5, 0x5, 0x7, 0xe1e, 0x7, 0x0, 0xf8d, 0x0, 0x800}, 0x0, 0x1, r5, 0x9) 01:27:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618", 0x2, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1782.542902] ieee802154 phy0 wpan0: encryption failed: -22 [ 1782.577453] ieee802154 phy0 wpan0: encryption failed: -22 01:27:43 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x0, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:43 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0xffffffffffffffff, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:43 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:27:43 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:43 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:43 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:27:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file1\x00', 0x40) [ 1799.576716] ieee802154 phy0 wpan0: encryption failed: -22 [ 1799.643901] ieee802154 phy0 wpan0: encryption failed: -22 [ 1799.695353] syz-executor.2[43134]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:27:43 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0xffffffffffffffff, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:43 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000340)=""/240, 0xf0}, {&(0x7f0000000440)=""/211, 0xd3}, {&(0x7f0000000000)=""/134, 0x86}], 0x3, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/43, 0x2b}, {&(0x7f0000000640)=""/102400, 0x19000}], 0x2, 0x0) r1 = getpid() pidfd_open(r1, 0x0) clone3(&(0x7f000001b640)={0x150500, &(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0), {0x10}, &(0x7f0000000540)=""/164, 0xa4, &(0x7f000001a640)=""/4096, &(0x7f0000000300)=[r0, r0, r0], 0x3}, 0x58) r3 = getpid() pidfd_open(r3, 0x0) r4 = getpid() pidfd_open(r4, 0x0) clone3(&(0x7f000001b700)={0x800, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), {0x1e}, &(0x7f0000000200)=""/39, 0x27, &(0x7f0000019640)=""/4096, &(0x7f000001b6c0)=[r1, r2, r0, r3, r0, r4], 0x6}, 0x58) 01:27:43 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f0000000000)="d31de9c4a4543604eca751a76a7cccf4f75fda43c53bf6d9897d5c0ca1217ca0626490f9506afaf6008fe33af0836fc29c59f4e61f59c54a06ecd9b792b8df59", 0x40, 0xda52) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:27:43 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1799.849262] ieee802154 phy0 wpan0: encryption failed: -22 01:27:43 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0xffffffffffffffff, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1799.983283] ieee802154 phy0 wpan0: encryption failed: -22 01:27:43 executing program 6: r0 = getpid() ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000140)={&(0x7f0000001c80)=""/4096, 0x1000}) r1 = getpid() perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x8, 0x3f, 0xf8, 0xff, 0x0, 0x100000001, 0x200, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x10001, 0x4}, 0x5840, 0x4, 0x6, 0x2, 0xffffffff, 0x1, 0x4, 0x0, 0x800, 0x0, 0x69}, r0, 0xe, 0xffffffffffffffff, 0xf) pidfd_open(r1, 0x0) process_vm_readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/239, 0x108}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4082, 0xff2}], 0x1, 0x0) [ 1800.035885] ieee802154 phy0 wpan0: encryption failed: -22 01:27:43 executing program 6: getpid() perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x1, 0x8, 0x0, 0x0, 0x5, 0x200, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x468707ed6b938587, @perf_bp={&(0x7f0000000100), 0x8}, 0x2, 0xfd97, 0x8001, 0x9, 0x4, 0x5, 0x200, 0x0, 0x1, 0x0, 0x8}, 0x0, 0x4, 0xffffffffffffffff, 0x2) 01:27:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x1c1042, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) lstat(&(0x7f0000000380)='./file1\x00', &(0x7f0000001500)) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x1) r1 = perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000050}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000300)={0x89f, 0x9, 0x0, 0x9, 0x4, [{0x7c, 0xb, 0x3, '\x00', 0xa84}, {0x0, 0x4, 0xffffffff}, {0x4, 0x0, 0x10000, '\x00', 0x1}, {0x1800000000000, 0x400, 0xfffffffffffffffc, '\x00', 0x1c86}]}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:27:43 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, 0x0) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:27:43 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000340)=0x80) dup(r1) 01:27:43 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1800.325331] ieee802154 phy0 wpan0: encryption failed: -22 [ 1800.379184] ieee802154 phy0 wpan0: encryption failed: -22 01:28:04 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:28:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4402, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r3, 0xfff0000000000000, 0x5, 0x2, 0x6}) 01:28:04 executing program 6: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x70, r0, 0x20, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1ff, 0x30}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x48}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x27}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x59}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6b}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x56}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000001a00)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x20, r0, 0x800, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4084) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r2, &(0x7f0000000000)={0x24, @long}, 0x11) sendmsg$802154_raw(r2, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000001940)="54d7fa2a62eb85e224a2b80316f62748c02991483a9c1404ac4e2f811081ec70d5306cc85ed1c75ca091d6f11dd099eadd15ad4716bfc7907544ab9118078ddc5e8916ea54f85a2cbdaf6f166fcc71d3b4e90485495b43c9ba0ea2d6358cf78b66942373f2574c3e9eba", 0x6a}, 0x1, 0x0, 0x0, 0x2}, 0x11) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x3) sendmsg$802154_raw(r2, &(0x7f0000000680)={&(0x7f0000000500)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0002}}}, 0x14, &(0x7f0000000640)={&(0x7f00000005c0)}}, 0x10) sendmsg$NL80211_CMD_STOP_NAN(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x20, r0, 0x400, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xffff, 0x47}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x880}, 0x4001850) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000000140)=""/62, 0x3e}, {&(0x7f0000000340)=""/164, 0xa4}, {&(0x7f0000000400)=""/203, 0xcb}, {&(0x7f0000000500)}], 0x5, 0x9, 0x4) 01:28:04 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:04 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, 0x0) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:04 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:04 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1821.181129] ieee802154 phy0 wpan0: encryption failed: -22 01:28:04 executing program 6: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000400)={'\x00', 0x8, 0x3b, 0x4, 0x100000000, 0x80000000}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000480)={0x404, {{0xa, 0x4e22, 0xfffffffc, @private1, 0x3}}}, 0x88) r2 = getpid() process_vm_readv(r2, &(0x7f0000000600)=[{&(0x7f0000000000)=""/249, 0xf9}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4080, 0xff0}], 0x1, 0x0) [ 1821.248266] ieee802154 phy0 wpan0: encryption failed: -22 [ 1821.313561] syz-executor.2[43911]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:28:05 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x8c}], 0x1, 0x0) 01:28:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r0, 0x0) pwrite64(r0, &(0x7f0000000140)="fd668da704449a1439ce0d6b1595129f063aedfd6b4baa52d7e3b36805c631e9f43357762030089eee62962cff87e8f091e250bfe21f408dc99f35ad11beac1b010cd28ad75c61914d49ff44ec329097a859f5f20b97622f6db075a4a0c7d852c7f4b3da61ec21c55f6c4f4848396cbc1edd71481a1238e1794d574c9520b98bac49ba", 0x83, 0x51) 01:28:05 executing program 6: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, &(0x7f0000000400)) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x20, r3, 0x1, 0x0, 0x0, {0x1c}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x20}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000640)={@multicast2, @broadcast, 0x0}, &(0x7f0000000680)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000880)={'ip6_vti0\x00', &(0x7f0000000800)={'ip6gre0\x00', 0x0, 0x4, 0x6, 0x3, 0xbf, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @local, 0x10, 0x80, 0x5, 0x3}}) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000001d80)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdbdf251f00000006002100620000006c0022800c0000800800050001000800060000010000080003006aa5000008000300000000001c00008008000200c2470000080004000700000008000600090000001c00008008000100d3a2000008000300820000000800010002000000380022803400008008000200ff7f0000080004000010000008000600ff7f000018080002000400000008000600fdffffff08000300ff0f000006002100620000001800228014000080080007000000000008000500feffffff07002100626200"/227], 0xe8}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000014) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001c80)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r10, @ANYBLOB="010c0001800800010049df5dc4db120b29580eba81042a295ed63b6f47cc909b302e50ad010c87809cdab11944df35a77c282a4d0122feff363a9d1d1f426eb97e7914c339ace6adec61c718ef95eea1dcbdd337847a0191f7f322a083212887d4634c19344d8d2fb7744d332dfc19c3b7c525cd62791e4e880d424f98c2", @ANYRES32=r11, @ANYBLOB], 0x20}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000008c0)={&(0x7f0000001ec0)={0x270, 0x0, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x44810}, 0x20004) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r0, 0x20, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x8090) r12 = getpid() process_vm_readv(r12, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:28:05 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(0xffffffffffffffff, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:05 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, 0x0) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:05 executing program 6: r0 = getpid() r1 = getpid() r2 = pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x2, 0x3, 0x8, 0x0, 0x1, 0x44860, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x8000, 0xe8, 0x8d, 0x1, 0x0, 0x3, 0xffff, 0x0, 0xfffffffa, 0x0, 0x3ff}, r1, 0xf, 0xffffffffffffffff, 0x9) process_vm_readv(0xffffffffffffffff, &(0x7f0000000600), 0x0, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) rt_tgsigqueueinfo(r0, r0, 0x19, &(0x7f0000000200)={0x0, 0x3, 0x1}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) prlimit64(r3, 0x1, &(0x7f0000000040)={0x68f, 0x7}, &(0x7f0000000080)) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4000010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x1, 0x0, 0x1}, 0x2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000800), 0x501100, 0x0) write$cgroup_pid(r6, &(0x7f0000000840)=r1, 0x12) process_vm_writev(r5, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/213, 0xd5}, {&(0x7f00000003c0)=""/137, 0x89}, {&(0x7f0000000480)=""/171, 0xab}, {&(0x7f0000000540)=""/186, 0xba}, {&(0x7f0000000600)=""/91, 0x5b}], 0x5, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/48, 0x30}, {&(0x7f0000000740)=""/101, 0x65}], 0x2, 0x0) 01:28:05 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80011}, 0x8090) r3 = getpid() process_vm_readv(r3, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 1821.899952] ieee802154 phy0 wpan0: encryption failed: -22 01:28:27 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/112, 0x70}, {&(0x7f0000000080)}, {&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/128, 0x80}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/228, 0xe4}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000400)=""/16, 0x10}], 0xa, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:28:27 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(0xffffffffffffffff, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x1542, 0x7ff, 0x6}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000180)='./file1\x00', 0xc) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x79}}, './file1\x00'}) 01:28:27 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:28:27 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:27 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:27 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1843.760473] syz-executor.2[44253]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1843.797992] ieee802154 phy0 wpan0: encryption failed: -22 01:28:27 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0x6, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:28:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {0x0}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:28:27 executing program 6: getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000002000/0x1000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000001000/0x3000)=nil, &(0x7f0000001000/0x1000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000240)="63ce723614a4287efbbebb9a905b402e91f553169f31779b6b81dd942cbd4f9d5e362ab47071145d49e22dc59b2c14fcd8f08bbc343d131c8405d8bc209d3c0c4833760eebca43addb7664fac509cf0a23e6d743d265950267d3d5aa2a4474a7b0f64e2911dae608049912951b5fd199ad286c33d3fd25c4426893f234cd6b0f469adf00c37b57f9e656fdc28d4e72a74d4e93d8760893466e79cdbffa9b6bd16d13f93fb3015bc6e46f2658d758ac8a627daadb0c58d22aec8abb1af0beb09ad4fe747b689e967bd3fe03b5da61e21f626b1427090d1b0be2af40fa4034f3ac9e713dabb334a9", 0xe7}, 0x68) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='net/ip6_mr_cache\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f00000005c0)=r3) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r1, 0x0, 0x10000027f) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f00000004c0)=0x1) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/241, 0xf1}, {&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f0000000180)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:28:27 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(0xffffffffffffffff, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1844.036869] syz-executor.2[44446]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:28:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) sendfile(r3, 0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@version_u}], [{@dont_hash}, {@obj_role={'obj_role', 0x3d, ' \x01\x00'}}, {@euid_lt={'euid<', r4}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise}]}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@rand_addr=' \x01\x00', @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x48}}, 0xe8) sendmmsg$inet6(r7, &(0x7f0000001580)=[{{&(0x7f0000001600)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) sendfile(r6, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0xff, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:28:27 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/246, 0x12c}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f00000006c0)=""/146, 0x92}], 0x3, &(0x7f0000001c40), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000001780)=""/4095, 0xfff}, {&(0x7f0000000340)=""/184, 0xb8}, {&(0x7f0000000100)=""/96, 0x60}, {&(0x7f0000000400)=""/192, 0xc0}, {&(0x7f00000004c0)=""/243, 0xf3}, {&(0x7f0000002c80)=""/4091, 0xffb}], 0x6, 0x7fffffff, 0xffff8001) sendfile(r3, r1, 0x0, 0x10000027f) dup(r3) 01:28:27 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1844.216408] ieee802154 phy0 wpan0: encryption failed: -22 01:28:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r0) pwritev(r0, &(0x7f0000000580)=[{&(0x7f0000000340)="acb346728551894ba40f9f5fbb67546384a682f69df6bb0636005dcad4c62c5b05de1a4a3295cb8bd4ad4e6995dbf17a66ef682ea96f53692ef6aead16c2f30fcba98e25a3fc2baa0a929432143ccde64394ed54c56e58b1fbb3fd390ad0bc4b6f807004d932adb089298b824261d6a2d85fccb124e4ceafd0fba58a6e2c66ca2a3d12435636403d00c0ce408d9d85eb9e170c8103cd12301c0076a57681bb54a583142519c039ddb46dee0ed35095429e4e2a9dc9104a97b4f7b83e4bb19dc7e5e3a7064bccf7f992372015808a0bf6f070d85ff2cd32164b9fff0f6a8259690421b4f93f4b", 0xe6}, {&(0x7f0000000100)="3deb20a5b4425a98bae0d8fe11062ca4093cf5de84e03c613389557f99c85a106bf9bbc7729342f9186c51b6b5ff4131df84e05dfed21fd7aee0aba9ac33f23906fa8006ca58125a90eceb95cff8d7d0f115bb6ded747934d50825ea8a12efb37bb7aa63a39fd3fa5bcc93d75e2865d16c8a33240282ec", 0x77}, {&(0x7f0000000440)="fa41b1289ff6f302a3f0e9da8e4960f2da6af1c0f6ffb77ee80be3ac9b380b454b4476328df19f9d59faf25cd0102a4d8e4c5eb6bb548c4466e8ce9e65c46c45f1fa9972038815a09673f65564708b84ec4138dd36ed7b250278c9e9325bbc9ddf81ef80b7c1c38b79b703e1ae64d952f2a14489dba4d7446926", 0x7a}, {&(0x7f00000004c0)="d9d3d4dda4bbcfd73d3e3854fd893aa5decdce7bfc187efad3c3e30d4ac97a849cb1aefbf23dd4ddf7cc65e2690c727e9ace63491eb146495b2abe43e922ae0673a47820ef72754bb6f4335e54277305101226113f8d254d5752d6356f402e525561f42d", 0x64}, {&(0x7f0000000540)}], 0x5, 0x3c00000, 0x5) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:28:46 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {0x0}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:28:46 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:46 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(0x0, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:28:46 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:46 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:46 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/261, 0x105}, {&(0x7f0000000480)=""/229, 0x127}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000001c80)=""/4097, 0x1001}], 0x1, 0x0) 01:28:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:28:46 executing program 6: r0 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000140)=0x2) getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000340)=""/211, 0xd3}, {&(0x7f0000000280)=""/132, 0x84}], 0x3, &(0x7f0000001c40), 0x0, 0x0) [ 1863.160973] ieee802154 phy0 wpan0: encryption failed: -22 [ 1863.254754] syz-executor.2[44712]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:28:46 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:28:46 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:28:46 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:28:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x10) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:28:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {0x0}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:28:47 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:28:47 executing program 6: r0 = getpid() r1 = getgid() setgroups(0x1, &(0x7f0000000000)=[r1]) r2 = getgid() setgroups(0x1, &(0x7f0000000000)=[r2]) r3 = getpid() pidfd_open(r3, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff, r2, 0x80, 0x8}, 0x0, 0x0, 0x4, 0x9, 0x92, 0x0, 0x80000000, 0x2, 0x3, 0x4, r3, r0}) process_vm_readv(r0, &(0x7f0000000600), 0x0, &(0x7f0000000040)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000380)=""/255, 0xff}], 0x2, 0x0) r4 = getgid() setgroups(0x1, &(0x7f0000000000)=[r4]) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3f, 0x5, 0x0, 0x0, 0x0, 0x3, 0x90048, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0x1, 0xa, 0x9, 0x0, 0x7, 0xca0, 0x0, 0x9, 0x0, 0x3}, r3, 0xc, 0xffffffffffffffff, 0x8) getgroups(0x5, &(0x7f0000000340)=[0x0, r2, r1, r2, r4]) [ 1863.773407] syz-executor.2[44914]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f00000001c0)=ANY=[@ANYBLOB="030312000007ff00243d3db9e280f663a0934f858e6b6c151f798b80cb038ec0d58f4887c29b4e545327d591579e68a0fa2eaf2db7eaa5aec8b3586971b85bb9bf43f093924b66e5a17236d6df826ed0da19a38d159a37d5a9849d272f86de0b5d40c225be4bcde66981b334bf1832bf44a1a36ca347e19373d36d928f"], 0x2d, 0x3) 01:29:02 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:29:02 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:29:02 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/123, 0xffffffffffffff65}, {&(0x7f0000000100)=""/58}, {&(0x7f0000000300)=""/240}, {&(0x7f0000000400)=""/155}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:29:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:02 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, 0x0, 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:02 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:02 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:29:02 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r2 = getpid() recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001f40)=[{{&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/70, 0x46}, {&(0x7f0000000440)=""/153, 0x99}, {&(0x7f0000000500)=""/111, 0x6f}, {&(0x7f0000000640)=""/182, 0xb6}], 0x4, &(0x7f0000000700)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000780)=""/230, 0xe6}, {&(0x7f0000001940)=""/211, 0xd3}], 0x2}}, {{&(0x7f0000000880), 0x6e, &(0x7f0000001e80)=[{&(0x7f0000000900)=""/22, 0x16}, {&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/253, 0xfd}, {&(0x7f0000001c80)=""/212, 0xd4}, {&(0x7f0000001bc0)=""/105, 0x69}, {&(0x7f0000001d80)=""/210, 0xd2}], 0x6, &(0x7f0000001f00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x38}}], 0x3, 0x103, &(0x7f0000002000)={0x0, 0x3938700}) r4 = getpid() r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, 0x0, 0x10000027f) kcmp(r3, r4, 0x6, 0xffffffffffffffff, r7) pidfd_open(r2, 0x0) setpgid(r1, r2) [ 1878.486110] syz-executor.2[44949]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1878.494443] ieee802154 phy0 wpan0: encryption failed: -22 01:29:02 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:29:02 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x1, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="def2f36df1da405f9cfdb28475f3ff6954dc8e2ba925aaaf31cf73d87a6ef6eca7d6fb014fe44ce3c90994e6b7758524edf1feabb078a74a335c7823871d07e880b8291a44c6c385b370fa03bb6612b38a9dd800ed4b61907880e220a9beb339bd125fdfe6acdff8802baceb3460b6ac649bc02e6ae1ac12a269733aa44f5fb3f1b5993ac035795514b3662a5eac67", 0x8f, 0x141c}], 0x8000, &(0x7f0000000280)={[{@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x30, 0x67]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x38, 0x78, 0x36, 0x70, 0x6b]}}, {@size={'size', 0x3d, [0x0, 0x44, 0x37, 0x67, 0x6b, 0x15, 0x67, 0x36, 0x2d, 0x36]}}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0x66, 0x63, 0x66, 0x62, 0x65, 0x63], 0x2d, [0x35, 0x34, 0x62, 0x39], 0x2d, [0x37, 0x64, 0x30, 0x33], 0x2d, [0x62, 0x31, 0x31, 0x31], 0x2d, [0x52, 0x64, 0x66, 0x0, 0xa1, 0x38, 0x30, 0x33]}}}, {@obj_type={'obj_type', 0x3d, '#%@.'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, 'c'}}, {@obj_user={'obj_user', 0x3d, ']:'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@permit_directio}]}) openat(r1, &(0x7f0000000100)='./file1\x00', 0x224e43, 0x86) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:29:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:02 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) [ 1878.726876] syz-executor.0[45090]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1878.735293] loop0: detected capacity change from 0 to 20 [ 1878.754295] tmpfs: Unsupported parameter 'huge' 01:29:02 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1878.805380] syz-executor.0[45138]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1878.815135] loop0: detected capacity change from 0 to 20 [ 1878.816550] tmpfs: Unsupported parameter 'huge' [ 1878.874979] syz-executor.2[45125]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:02 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40), 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000340)=""/242, 0xf2}, {&(0x7f0000000440)=""/173, 0xad}, {&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000000500)=""/92, 0x5c}, {&(0x7f0000000140)=""/32, 0x20}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000000580)=""/23, 0x17}], 0x7, 0x8, 0x6a769170) pidfd_open(r0, 0x0) setpriority(0x1, r0, 0x200) 01:29:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) sendfile(r3, 0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@version_u}], [{@dont_hash}, {@obj_role={'obj_role', 0x3d, ' \x01\x00'}}, {@euid_lt={'euid<', r4}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise}]}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@rand_addr=' \x01\x00', @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x48}}, 0xe8) sendmmsg$inet6(r7, &(0x7f0000001580)=[{{&(0x7f0000001600)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) sendfile(r6, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0xff, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:29:16 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:16 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:29:16 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) sendfile(r3, 0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@version_u}], [{@dont_hash}, {@obj_role={'obj_role', 0x3d, ' \x01\x00'}}, {@euid_lt={'euid<', r4}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise}]}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@rand_addr=' \x01\x00', @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x48}}, 0xe8) sendmmsg$inet6(r7, &(0x7f0000001580)=[{{&(0x7f0000001600)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) sendfile(r6, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0xff, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:29:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) sendfile(r3, 0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@version_u}], [{@dont_hash}, {@obj_role={'obj_role', 0x3d, ' \x01\x00'}}, {@euid_lt={'euid<', r4}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise}]}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@rand_addr=' \x01\x00', @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x48}}, 0xe8) sendmmsg$inet6(r7, &(0x7f0000001580)=[{{&(0x7f0000001600)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) sendfile(r6, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0xff, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:29:16 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, 0x0, 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:16 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) sendfile(r3, 0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@version_u}], [{@dont_hash}, {@obj_role={'obj_role', 0x3d, ' \x01\x00'}}, {@euid_lt={'euid<', r4}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise}]}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@rand_addr=' \x01\x00', @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x48}}, 0xe8) sendmmsg$inet6(r7, &(0x7f0000001580)=[{{&(0x7f0000001600)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) sendfile(r6, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0xff, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) 01:29:16 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000480)=""/232, 0xe8}, {&(0x7f0000000280)=""/120, 0x78}, {&(0x7f0000000340)=""/179, 0xb3}, {&(0x7f0000000100)=""/85, 0x55}], 0x5, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4089, 0xff9}], 0x1, 0x0) [ 1893.109442] ieee802154 phy0 wpan0: encryption failed: -22 [ 1893.138855] syz-executor.2[45287]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:16 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:29:16 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) tee(r0, 0xffffffffffffffff, 0x6ff, 0x7) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x20]}, 0x8, 0x80000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'geneve0\x00', {0x2, 0x0, @multicast2}}) r2 = getpid() process_vm_readv(r2, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:29:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262", 0x6a}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:17 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:29:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000140)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$nl_xfrm(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)=ANY=[@ANYBLOB="300000001d00010028bd7000fddbdf2508000b00010100000a0010"], 0x30}}, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$dupfd(r2, 0x0, r2) r3 = fork() ptrace$poke(0x5, r3, &(0x7f00000001c0), 0x99) r4 = fork() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x8}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1/file0\x00', 0x404142, 0xc5) r5 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000000)={0x2b1, 0xffffffff}) [ 1893.441988] syz-executor.2[45415]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262", 0x6a}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:17 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:17 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, 0x0, 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:17 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) rt_sigqueueinfo(r1, 0x27, &(0x7f0000000100)={0x40, 0x0, 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)={0x0, 0x0}) ptrace$peeksig(0x4209, r2, &(0x7f00000003c0)={0x5, 0x0, 0x2}, &(0x7f0000000400)=[{}, {}]) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, 0x0, 0x10000027f) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 1893.717693] syz-executor.2[45612]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:17 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) tee(r0, 0xffffffffffffffff, 0x6ff, 0x7) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x20]}, 0x8, 0x80000) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'geneve0\x00', {0x2, 0x0, @multicast2}}) r2 = getpid() process_vm_readv(r2, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:29:17 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)=']/\x00') 01:29:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) sendfile(r3, 0xffffffffffffffff, &(0x7f00000003c0)=0x1, 0x6) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache}, {@version_u}], [{@dont_hash}, {@obj_role={'obj_role', 0x3d, ' \x01\x00'}}, {@euid_lt={'euid<', r4}}, {@dont_measure}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@appraise}]}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@rand_addr=' \x01\x00', @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0x48}}, 0xe8) sendmmsg$inet6(r7, &(0x7f0000001580)=[{{&(0x7f0000001600)={0x2, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) sendfile(r6, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) sendfile(r1, r2, &(0x7f0000000000)=0xff, 0x3) creat(&(0x7f0000000040)='./file1\x00', 0x0) [ 1893.814830] ieee802154 phy0 wpan0: encryption failed: -22 01:29:33 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:33 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 1) 01:29:33 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x0, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:33 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:33 executing program 6: r0 = getpid() ptrace$peeksig(0x4209, r0, &(0x7f0000000000)={0x9, 0x1, 0xa}, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]) process_vm_readv(r0, &(0x7f0000000600), 0x0, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) ptrace$peeksig(0x4209, r1, &(0x7f00000005c0)={0x2, 0x0, 0x4e}, &(0x7f0000000600)) r2 = getpid() r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, 0x0, 0x10000027f) recvmsg$unix(r5, &(0x7f0000001b00)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000000680)=""/171, 0xab}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000740)=""/237, 0xed}, {&(0x7f0000000840)=""/232, 0xe8}, {&(0x7f0000001940)=""/116, 0x74}], 0x6, &(0x7f0000001a40)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x10000) pidfd_open(r2, 0x0) capset(&(0x7f0000000600)={0x20071026, r2}, &(0x7f0000000640)={0x6, 0x4, 0x7ff, 0x8, 0x6, 0x8000}) 01:29:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbd", 0x99, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x12, 0x1, 0x3) 01:29:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262", 0x6a}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1909.483872] ieee802154 phy0 wpan0: encryption failed: -22 01:29:33 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 1) [ 1909.538840] syz-executor.2[45849]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1909.594478] FAULT_INJECTION: forcing a failure. [ 1909.594478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1909.595470] CPU: 1 PID: 45861 Comm: syz-executor.0 Not tainted 6.5.0-rc6-next-20230817 #1 [ 1909.595962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1909.596453] Call Trace: [ 1909.596627] [ 1909.596791] dump_stack_lvl+0xc1/0xf0 [ 1909.597041] should_fail_ex+0x4b4/0x5b0 [ 1909.597308] _copy_from_user+0x30/0xf0 [ 1909.597579] scsi_cdrom_send_packet+0x1b1/0x510 [ 1909.597878] ? __pfx_scsi_cdrom_send_packet+0x10/0x10 [ 1909.598209] ? __lock_acquire+0x19b1/0x6340 [ 1909.598501] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1909.598831] ? cdrom_ioctl+0x55e/0x27e0 [ 1909.599088] ? scsi_block_when_processing_errors+0x22b/0x360 [ 1909.599447] ? __pfx_cdrom_ioctl+0x10/0x10 [ 1909.599743] ? __pfx_perf_trace_lock+0x10/0x10 [ 1909.600046] scsi_ioctl+0x131/0x15a0 [ 1909.600304] ? __pm_runtime_resume+0xc9/0x180 [ 1909.600596] ? __pfx_scsi_ioctl+0x10/0x10 [ 1909.600859] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1909.601237] ? mark_held_locks+0x9e/0xe0 [ 1909.601502] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1909.601829] ? __pm_runtime_resume+0xc9/0x180 [ 1909.602122] sr_block_ioctl+0x204/0x250 [ 1909.602376] ? __pfx_sr_block_ioctl+0x10/0x10 [ 1909.602660] blkdev_ioctl+0x2e4/0x750 [ 1909.602905] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1909.603194] ? selinux_file_ioctl+0xba/0x270 [ 1909.603480] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1909.603753] __x64_sys_ioctl+0x1a4/0x210 [ 1909.604031] do_syscall_64+0x3f/0x90 [ 1909.604282] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1909.604609] RIP: 0033:0x7f1ed5eaab19 [ 1909.604847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1909.605924] RSP: 002b:00007f1ed3420188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1909.606391] RAX: ffffffffffffffda RBX: 00007f1ed5fbdf60 RCX: 00007f1ed5eaab19 [ 1909.606829] RDX: 0000000020000100 RSI: 0000000000005393 RDI: 0000000000000003 [ 1909.607258] RBP: 00007f1ed34201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1909.607691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1909.608125] R13: 00007ffc4a3a448f R14: 00007f1ed3420300 R15: 0000000000022000 [ 1909.608601] [ 1909.626102] syz-executor.4[45862]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:33 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 1) [ 1909.659449] FAULT_INJECTION: forcing a failure. [ 1909.659449] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1909.661738] CPU: 0 PID: 45875 Comm: syz-executor.1 Not tainted 6.5.0-rc6-next-20230817 #1 [ 1909.662822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1909.663896] Call Trace: [ 1909.664286] [ 1909.664607] dump_stack_lvl+0xc1/0xf0 [ 1909.665131] should_fail_ex+0x4b4/0x5b0 [ 1909.665714] _copy_from_user+0x30/0xf0 [ 1909.666308] scsi_cdrom_send_packet+0x1b1/0x510 [ 1909.666965] ? __pfx_scsi_cdrom_send_packet+0x10/0x10 [ 1909.667684] ? __lock_acquire+0x19b1/0x6340 [ 1909.668342] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1909.669067] ? cdrom_ioctl+0x55e/0x27e0 [ 1909.669637] ? scsi_block_when_processing_errors+0x22b/0x360 [ 1909.670461] ? __pfx_cdrom_ioctl+0x10/0x10 [ 1909.671062] ? __pfx_perf_trace_lock+0x10/0x10 [ 1909.671726] scsi_ioctl+0x131/0x15a0 [ 1909.672284] ? __pm_runtime_resume+0xc9/0x180 [ 1909.672913] ? __pfx_scsi_ioctl+0x10/0x10 [ 1909.673498] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1909.674360] ? mark_held_locks+0x9e/0xe0 [ 1909.674949] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1909.675654] ? __pm_runtime_resume+0xc9/0x180 [ 1909.676324] sr_block_ioctl+0x204/0x250 [ 1909.676886] ? __pfx_sr_block_ioctl+0x10/0x10 [ 1909.677537] blkdev_ioctl+0x2e4/0x750 [ 1909.678080] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1909.678695] ? selinux_file_ioctl+0xba/0x270 [ 1909.679332] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1909.679935] __x64_sys_ioctl+0x1a4/0x210 [ 1909.680530] do_syscall_64+0x3f/0x90 [ 1909.681066] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1909.681784] RIP: 0033:0x7fcce18d6b19 [ 1909.682325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1909.684698] RSP: 002b:00007fccdee4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1909.685691] RAX: ffffffffffffffda RBX: 00007fcce19e9f60 RCX: 00007fcce18d6b19 [ 1909.686636] RDX: 0000000020000100 RSI: 0000000000005393 RDI: 0000000000000003 [ 1909.687571] RBP: 00007fccdee4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1909.688518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1909.689449] R13: 00007ffc3bef836f R14: 00007fccdee4c300 R15: 0000000000022000 [ 1909.690412] 01:29:33 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 2) 01:29:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6ce", 0x9f}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbd", 0x99, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:33 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x0, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 1909.893483] syz-executor.4[46035]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1909.896619] ieee802154 phy0 wpan0: encryption failed: -22 [ 1909.958109] FAULT_INJECTION: forcing a failure. [ 1909.958109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1909.959801] CPU: 0 PID: 46059 Comm: syz-executor.0 Not tainted 6.5.0-rc6-next-20230817 #1 [ 1909.960888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1909.961940] Call Trace: [ 1909.962303] [ 1909.962609] dump_stack_lvl+0xc1/0xf0 [ 1909.963126] should_fail_ex+0x4b4/0x5b0 [ 1909.963692] _copy_from_user+0x30/0xf0 [ 1909.964284] sg_io+0x2bf/0xd80 [ 1909.964759] scsi_cdrom_send_packet+0x2aa/0x510 [ 1909.965420] ? __pfx_scsi_cdrom_send_packet+0x10/0x10 [ 1909.966141] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1909.966872] ? __pfx_perf_trace_lock+0x10/0x10 [ 1909.967513] scsi_ioctl+0x131/0x15a0 [ 1909.968019] ? __pm_runtime_resume+0xc9/0x180 [ 1909.968672] ? __pfx_scsi_ioctl+0x10/0x10 [ 1909.969245] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1909.970016] ? mark_held_locks+0x9e/0xe0 [ 1909.970605] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1909.971285] ? __pm_runtime_resume+0xc9/0x180 [ 1909.971897] sr_block_ioctl+0x204/0x250 [ 1909.972453] ? __pfx_sr_block_ioctl+0x10/0x10 [ 1909.973046] blkdev_ioctl+0x2e4/0x750 [ 1909.973569] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1909.974129] ? selinux_file_ioctl+0xba/0x270 [ 1909.974761] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1909.975338] __x64_sys_ioctl+0x1a4/0x210 [ 1909.975877] do_syscall_64+0x3f/0x90 [ 1909.976410] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1909.977082] RIP: 0033:0x7f1ed5eaab19 [ 1909.977574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1909.979820] RSP: 002b:00007f1ed3420188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1909.980798] RAX: ffffffffffffffda RBX: 00007f1ed5fbdf60 RCX: 00007f1ed5eaab19 [ 1909.981694] RDX: 0000000020000100 RSI: 0000000000005393 RDI: 0000000000000003 [ 1909.982586] RBP: 00007f1ed34201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1909.983497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1909.984427] R13: 00007ffc4a3a448f R14: 00007f1ed3420300 R15: 0000000000022000 [ 1909.985359] [ 1910.041998] syz-executor.2[46072]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:29:49 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 1) 01:29:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6ce", 0x9f}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:49 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 2) 01:29:49 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618", 0x2, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:49 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) (fail_nth: 3) 01:29:49 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x0, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:49 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:49 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000007e40)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000007e80), 0x400, 0x0) r6 = fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r7, 0x0) r8 = getgid() setgroups(0x1, &(0x7f0000000000)=[r8]) [ 1926.116208] syz-executor.2[46270]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1926.123108] ieee802154 phy0 wpan0: encryption failed: -22 sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007f80)={&(0x7f00000005c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x20200000}, 0xc, &(0x7f0000001bc0)=[{&(0x7f0000000640)={0x234, 0x32, 0x100, 0x70bd26, 0x25dfdbfe, "", [@typed={0x8, 0x34, 0x0, 0x0, @u32=0x80000001}, @typed={0xc, 0xb, 0x0, 0x0, @u64}, @typed={0x4, 0x3a}, @typed={0x8, 0x55, 0x0, 0x0, @u32}, @generic="17d9fddef1c5d3720dc37c01b59ba4831fe2aba9a113fe7009c0dfdaba52af9016c3cc6f7e2fb52d171c5308928ad43190ecbedff377c8d704912d52b1b2d57cf190b6480d84eb835906e40dac5b79ede28641c9490cbfb6081e15fff01ab551d0653ee1abdd5e4b9bf57375f4ca85be5c37bba8f1c9c1e1f133b0d7b17f09de7d4ac95700de93ac5cc389930d18358907cc6a29d5f2d321c422f4d0f0c276959a5b89bd62078d1590314b12cad550887cbe20", @generic="e6469d0861fedaecc4669a68f4ac2f6650278739f368fcf7c8f9cc22b962b472d3e00d37c47d2d3397b29a74e448a05159a89e5189f809efcc34e83b73032a14f74560761decaae71b13cad653e8e914960f9ad524fbb2a6a3ef07fc90954293536b888e2cee546c8a58c24223a46127e49756cd89bcc65e963209850ee36637f8724b34c65c9ebaf493a9aba9e5e52a3ecb7c7c8db51ebfbab6de88c50983f0f729817d2daa2ae77e1acc7cb91d6898d21ca15785837475f6a18f912c5eab5a018dfa4f977e86d87db08b773223ab12accbf8474ab2e5505565f1840c72119eab1d0439df3670c2eedd6ae1607c1f", @typed={0x5f, 0x27, 0x0, 0x0, @binary="e35ff6ff4f31c5dd77a1fb6703c112a8665de9fce4366fae9127bfbd84ead514584e0f8507ce711bd488ed8753a161dc41dae8fc5012b2e982564dccbff1ab195637b632b93c89194a8b1fd9e9e1c4f7e32a81352ec9b55796b4aa"}]}, 0x234}, {&(0x7f0000001c80)={0x49c, 0x2c, 0x10, 0x70bd26, 0x25dfdbff, "", [@nested={0x24, 0x87, 0x0, 0x1, [@typed={0x14, 0x7b, 0x0, 0x0, @ipv6=@local}, @typed={0x8, 0x84, 0x0, 0x0, @fd}, @typed={0x4, 0x27}]}, @nested={0xdb, 0x8e, 0x0, 0x1, [@generic="5a306708dcdc803240d624060d645b00aa8e608818aa4e5729085b0a0d9c4a56259a74e9b15d", @typed={0x8, 0x22, 0x0, 0x0, @fd}, @typed={0x8, 0x3c, 0x0, 0x0, @u32=0xaed}, @generic="c50bd35e9bcdba50ec95c5ecc11e4a630f4fb3bec528a25e69d93fc6626820ddb04eed19b42a35a5679505bcdca82d476bb0dbd072d6d5dd52461043558b06a31399bec0ceccbb655c55f429725d821896a3711c7466beb8948e96a96b1bb195f021eb493272d012e914dd8a6ebf491c65ffe47006f765787ce94b22f0da9d5fc31169b32c73fe99f5939c26f88cb0c6cc31c684f83eed4946", @typed={0x8, 0x54, 0x0, 0x0, @ipv4=@loopback}]}, @generic="1f72a94922c2ec9319ebd34fd1272de01f1c878115ff5fa9653cf89e6c571092733e67e186d3d34d70aaf6e4fdeeb3b9462f3b50d93f662deadab7bb1f70abcfbcb1500aee26a3825193727210037b4d1dc913435cfb643f2cdd4dcda77e9bb5d5f87065d5eb951d52cf736e429c4c957c86ba625f89bd6fed114e29942c54ec2d50c1ec9936b86414dbd758f39a478a8ec38bbcba58b7af3c747a016388b06f669913e9ef85ac445c60c458b63c1ac4df019388a88b23f8e6785213817f8073ffa57628baba4e46580070677e", @nested={0x2b6, 0x55, 0x0, 0x1, [@typed={0x8, 0x8f, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x8, 0x70, 0x0, 0x0, @str='}#@\x00'}, @generic="26bb81319d5096fec7cf912d7d18920fcf345076eb503176128ffaa2a75138760b57c2105c341296bd42e1aad89825cb1bbffdff2e7c2b8ca04d9bb114ea01833fd2", @generic="cd21a0922df0ff87367280a76ef313a10134d940ddadfff37378fa7b4b38d7e4726cb372d4b5e2f6b67f86d1eeee96e4747bd8cf78503996eba2212f4b10e7e209e97609f6dc23fbb94647bd0e9d5aa0aca06cc007c3fff335394d6a7fa2ff10889424560e87314934716d7184bd3ffd30f126b01ad4867dd32fb4514ed02e8262bfb81975e9a05e234e938fdce4eff3aeee052d44271a936cd4df33c3ccf8cdcc02d58dfec8", @typed={0x8, 0x28, 0x0, 0x0, @u32}, @generic="d4f6f9086a308ad54b3ff7f56987868b582e514486657389368fda49e318", @generic="2bb6ee683a7c98026997026a62a22a37cbc1a952c7aebcb5ce9170a4caeb5013feeb487456cd895f8110c75e05d16e53ef757de220ff0b5da8be1ffadfbca36a5a862c8dd583ab670a8e1f10fbfa107aabe13d216b0b20cae44756341e610da4c13c068e6b5fd5be2c0a7fc627f2fa6eb23ed2bdc1a49679a1acdfac0a5135e4b21fab341e137cc483101dbc487ca965e3e22ceed661ccd5a93d0741a5d7435d1ada92cca45f694d676a03048e9114db0b3f1b93b0e84c46c9d6cdaee53a2cc6944903ce8546f9c88cb1a956f7919a8c7a7c354146", @generic="ae373a475758c43a45b6550cdf38643409a04c099a", @generic="f7efdf81bc430c54cbb3f69bdfaf4046a775a944f6cdf2768290fe4e46696da2c5a572b3b2e3b8650c9a6c185f2c48677e894b6321452ca6a53e6cb8a7297b8b62d38d3da035f1cebff97662a02b8def858cc614e1e7ce9c8a25d7b109aef0f3e045d65e03e713a50ab1e058860651d28a08154fb8284e0174bde07b0039200ba4f0b8321b0bad716f41f5814967c4373b590cf35d54d2867929e2522db1bf28f75421e00e5ef02ac477"]}, @typed={0x4, 0x3a}]}, 0x49c}, {&(0x7f0000002280)={0x2218, 0x35, 0x0, 0x70bd27, 0x25dfdbfb, "", [@typed={0xc, 0x94, 0x0, 0x0, @u64=0x5}, @nested={0x20c4, 0x76, 0x0, 0x1, [@typed={0x14, 0x2b, 0x0, 0x0, @ipv6=@mcast2}, @generic="5239ba87747bbeec5531d979519e39d5b9f6f529d6452e6f8c25359a23984a24111a9115fcd22e7a2c3a9b927274893fe18139b9dddbec15c5ba6029a42b111a340813ad45eb71c6fd72846b3dbdc7758030c5b462fee82c84bb40c9122b876b1d5e77d408f02889841ca9ceae10da9bea7d3d0c1c43fab03e1c94345bddfe74de1c93e561aa67514d1ff6ed640effa4", @typed={0x8, 0x7a, 0x0, 0x0, @fd}, @typed={0xc, 0x32, 0x0, 0x0, @u64=0x10000}, @typed={0x8, 0x15, 0x0, 0x0, @pid}, @generic="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", @generic="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"]}, @nested={0x92, 0x2b, 0x0, 0x1, [@typed={0x14, 0x70, 0x0, 0x0, @ipv6=@mcast2}, @generic="0c7bb7ae288e120bb5bed510833a98226f827c6877810319048f20e60e244876505b5823c3022d8264e07d0d7636d4ee4e645251002f2ea374153fdfc04a7c80081bcd33ef998066a52d5cf388d3dbaee3f5df1b267536ecd124502b5cf6d6e1f73d36f72afadb0bccf2e9ab51ac1673aa76", @typed={0x8, 0x66, 0x0, 0x0, @fd}]}, @generic="aea6309906e81b529c2806fb7765702134531587bc64ed88cbfc8e463200aea71c33ec836fa929d8f413921823c056e64a68e95fe41c04aa3ab1a152243b7900477fb5ffb922d2dd2905ff29be71df73ef5230e0f50c9143fc9dc96fdcc6085550500ee4d75099e886d897b118ee19e950697e6a5b4be8087eb112f9ad8841b4db3dcc271a90e96053f69bb5d866e329c7680aa2d7b43dd6bf33b282918cc24c4a5d"]}, 0x2218}, {&(0x7f00000044c0)={0x2ec, 0x12, 0x20, 0x70bd2d, 0x25dfdbfc, "", [@generic="9f17275bb3e7d4afac43c4764f67a7bf7e0f199b38d18fa8784363461ccfa339b9deb1ed159bf70f33ba2fe6e5b671420d1564da35b195e7af08368c39d8c3f40c9e62a147d1e8b3e43a952105f771f136cbb6b9ef187501b19e758570ca0e0c9e73b90c2bbdbc628fa817288ad002766d9e1f9dd246dfa2a7064d26fe82de000a7ac774d1d94b58ffb0cc379fece5f1ff5543fa6269db07685f551531a1b361c8dec0d256fbd8d7e03d3042904e730754c04591338c4184d6863234eb041658a23e3cbab8", @nested={0xd3, 0x19, 0x0, 0x1, [@typed={0x9b, 0x51, 0x0, 0x0, @binary="dc58a4e2f38b678aa14b204eae48fd018f2d202b5f3b9cd5bfbce6763b4d3959fb19c98029f442e08ce02d05a8e3dd70f5f44ec2229937ac92df0adb76e6bb61019987d3a240e1ee929503af5393c27dd3832c2bf3ecb00a390a11d99e2591989aacf45ced46305b7ab72c36e0c48b241d756cf923407414b92fd4376b681a8a67f1158eca4ca01ac096d5168daced83c3c6b1ccc1e4ed"}, @typed={0x16, 0x44, 0x0, 0x0, @str='/proc/vmallocinfo\x00'}, @generic="782d08c726be14f859bf4481d44085ca5d2258", @typed={0x8, 0x6e, 0x0, 0x0, @fd}]}, @typed={0xc, 0x88, 0x0, 0x0, @u64=0x4}, @generic="7dd2e2b07e993aa4c5a464442d6c7d9cd464fb74a7e8766c595e04f54076dd59a887df26437bf1791e702d34420acbabd4c2e898f9cd9ee9e9bd8a0e0657df7d2f0f368b36bd45957e28533b52424c8348ea843f2be80a923fff556c1f25d1311ae93d29210de6d6a5914e4c9e8bc802927679f41f", @nested={0x18, 0x7, 0x0, 0x1, [@typed={0xc, 0x41, 0x0, 0x0, @u64=0x401}, @typed={0x8, 0x5f, 0x0, 0x0, @u32}]}, @generic="e717abde01b759bd4e495cb9b5f86865be06f050cae09555067bc39e84c68bfb65eb519d4280b7451e8b2e4df24bc40e14b8cf5c4a4dd11db4511f36e1cd9c45d53dae267758724ec2bbb691d497f8986916f0e25df0547652c8e380c192498b47d1b2efb8701d77f33f81d01c6b8084674c6b91546aff7bd46e753c1cba4fb7b15db4c27816c93e9a86346a3dde5a5425d88d8a573b6d5e368ac758cc239ac1c09ec83e48e82df136"]}, 0x2ec}, {&(0x7f00000047c0)={0x1050, 0x3c, 0x25, 0x70bd28, 0x25dfdbff, "", [@generic="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", @typed={0x8, 0x5e, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x8, 0x69, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @typed={0x4, 0x51}, @typed={0x8, 0x4c, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x8, 0x92, 0x0, 0x0, @pid}, @nested={0xf, 0x8e, 0x0, 0x1, [@generic="d7ed571eb2a4dd4193a7a9"]}, @typed={0xc, 0x24, 0x0, 0x0, @u64=0x1}]}, 0x1050}, {&(0x7f0000005840)={0xb8, 0x42, 0x400, 0x70bd28, 0x25dfdbfe, "", [@nested={0xa6, 0x6d, 0x0, 0x1, [@generic="6ef4f9de471441a3cddf3291be7a96be2cac4fc0416bf478c2a2e2a004ff447f5b69100b087da26bbe53ddc622cb6a1c3e59f34cc363487aff9a5243aada2732cdc45ca38840505db7da5e234bbb83d1151033c93c8fee888a7805d3b8ee1be999d78702cf6ed8a89f68939bbbfc6a77291945b0a73b62d34c1d65d5008562d9bcdfd1d8c8f8cbb0d95ded8ed410", @typed={0x8, 0x72, 0x0, 0x0, @fd}, @typed={0xc, 0xf, 0x0, 0x0, @u64=0xffffffffffffffff}]}]}, 0xb8}, {&(0x7f0000005900)={0x22d0, 0x3d, 0x2, 0x70bd28, 0x25dfdbfd, "", [@typed={0xc, 0x95, 0x0, 0x0, @u64=0xffffffffffffffc0}, @generic="e1a171205a7298524dbee0f1e441d917935075fded72c7e41c362de8fcdfa63eef7082074f0785ddf021e7121672c2b5c025a195e75db96979af5cdae697d4d5c90f48f743ad78925d9cd7d6a1f435acbfa698a1775505ca8de91cc311d3a6fd00afbb5b19cacb98f5d1a27024a972eb9b87cf1f3f7769a1f04a2e767e04c4aeaaa95aa0fd6e695833e186f17444bca7e2a109d7825f3860b2349c917616dc99c8f5ab", @nested={0x1089, 0x8a, 0x0, 0x1, [@typed={0x8, 0x1b, 0x0, 0x0, @ipv4=@local}, @generic="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", @typed={0x8, 0x2f, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0xd}}, @generic="931f5fe40511405d12b6805f7b537d5bdeb9e03374065a", @generic="422cdd2d7cce0cc7177863fd232b08afaf371f2309c470a52cbce8a27dd6542babef65bd7236ac54146385d567f4af4b832b65ba62540e3c6850d6b598f5199acbf6f6038a25fa7f529cc03fd21b5745d3cdf6b7e494bd3da33351472e38"]}, @nested={0x10, 0x11, 0x0, 0x1, [@typed={0x4, 0x6a}, @typed={0x8, 0x1f, 0x0, 0x0, @pid=r0}]}, @nested={0x111e, 0x2d, 0x0, 0x1, [@generic="960a0f8f4371cfc4be4fbf7d0d9a23074bba56272fc697c6a2d04cab333c2c2943a7ff49f081c13023b718e0a5d3550a6fbd369fbab11480fcb87edff68d939c7a578cc1c714e21e052a7f0c654ff8817919cb65f46b33add278c45d", @generic="a73d0a0f29d3004674b4520a9c39fe029f134093931661dffe029a19716f98892b22674598066769e27470f85ca64507ded6745c1a3db0513c7f25ea54bca86007511fe10e8349176b699efbb6419c37042f71a44ab70ca7543a9d6a1d4d1ebf902099a199e48a7d99a7e87bba15d29fee66b8ef5bad385e40280fca7651c85c7e8c91e65a5654553ac7535c0a6018afae81476447621a1ea79cc45defc23e580abc7d720c3cd70c3b4ea0d96ed75187fdb07e2b5cd744be9a5ec1c19c3c", @generic="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"]}, @typed={0x4, 0x7d}, @typed={0x8, 0x49, 0x0, 0x0, @u32=0x5}, @generic="be1cd12181e67c3ca8165501f1fa9a8a219c97f477845530e95ab60b152c11bc6fa1399c7c92f2f3d97ba0f9bb1b97395e0ea88cb31a67a794fbadb4c3cbb7b509e24b3ff7db5dd40b"]}, 0x22d0}, {&(0x7f0000007c00)={0x154, 0x40, 0x300, 0x70bd2a, 0x25dfdbfe, "", [@generic="435427f1e217cf488c9b6934c79d6fe409981c5f0da736fd9266951df8822185bd8eca86780285f5f098403fdc1e31e39549ea3e88f7031afb15d97dfb7308fd23589fd5d8ac0f34d8082baabf07fb5ca7d77b320f556ec9798d7c29268ec702ad729262f74f71f3a88b62ddb11f8dd80653b4b45004811283e1d5148fe1fbfee2cee047ad9774d6b25e5d2d45a010a83517ee4f05bda0213c78da0f841deef5b845f3216cc3aa31fea7cf0d63be72d26c0bc636682079d2122fe7b7c663946af2e3fe258b9c192bde1e5842bc3cbf6ff4", @generic="46b887e6d88902d5dafd57a0e0809142104d60e9c2d1f6d01d8fcc148b2b4a15b81ab0b05863e81a2d09d3b2c35bc54e51ed46d405633d3f00a310d1a9cbde845094e35505b865c1caab00aee2b1f7ef74affb0a39a3d56ba787e036c7d2c5f6344088550ab8e0cb90cfef5da031586277"]}, 0x154}], 0x8, &(0x7f0000007ec0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r2, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r0, r7, r8}}}], 0xa8, 0x1}, 0x20044001) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r10 = socket$inet6_udp(0xa, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, 0x0, 0x10000027f) recvmsg(r11, &(0x7f0000000540)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)=""/55, 0x37}, {&(0x7f0000000380)=""/111, 0x6f}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000000440)=""/31, 0x1f}], 0x4, &(0x7f00000004c0)=""/73, 0x49}, 0x10001) [ 1926.162652] FAULT_INJECTION: forcing a failure. [ 1926.162652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1926.164947] CPU: 1 PID: 46280 Comm: syz-executor.1 Not tainted 6.5.0-rc6-next-20230817 #1 [ 1926.166003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1926.167040] Call Trace: [ 1926.167391] [ 1926.167699] dump_stack_lvl+0xc1/0xf0 [ 1926.168221] should_fail_ex+0x4b4/0x5b0 [ 1926.168791] _copy_from_user+0x30/0xf0 [ 1926.169337] kstrtouint_from_user+0xb0/0x170 [ 1926.169932] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1926.170594] ? lock_acquire+0x19a/0x4c0 [ 1926.171136] ? ksys_write+0x122/0x250 [ 1926.171674] proc_fail_nth_write+0x7d/0x270 [ 1926.172245] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1926.172925] ? lock_is_held_type+0x9f/0x120 [ 1926.173523] vfs_write+0x2b9/0xda0 [ 1926.174014] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1926.174668] ? __pfx_vfs_write+0x10/0x10 [ 1926.175216] ? lock_release+0xf3/0x680 [ 1926.175757] ? __fget_files+0x267/0x480 [ 1926.176318] ksys_write+0x122/0x250 [ 1926.176832] ? __pfx_ksys_write+0x10/0x10 [ 1926.177395] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1926.178099] do_syscall_64+0x3f/0x90 [ 1926.178602] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1926.179288] RIP: 0033:0x7fcce18895ff [ 1926.179782] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1926.182070] RSP: 002b:00007fccdee2b170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1926.183039] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcce18895ff [ 1926.183950] RDX: 0000000000000001 RSI: 00007fccdee2b1e0 RDI: 0000000000000004 [ 1926.184866] RBP: 00007fccdee2b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1926.185765] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1926.186663] R13: 00007ffc3bef836f R14: 00007fccdee2b300 R15: 0000000000022000 [ 1926.187601] [ 1926.198463] ieee802154 phy0 wpan0: encryption failed: -22 [ 1926.218991] FAULT_INJECTION: forcing a failure. [ 1926.218991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1926.220033] CPU: 0 PID: 46336 Comm: syz-executor.4 Not tainted 6.5.0-rc6-next-20230817 #1 [ 1926.220617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1926.221121] Call Trace: [ 1926.221293] [ 1926.221458] dump_stack_lvl+0xc1/0xf0 [ 1926.221752] should_fail_ex+0x4b4/0x5b0 [ 1926.222060] _copy_to_user+0x30/0xc0 [ 1926.222348] simple_read_from_buffer+0xd0/0x170 [ 1926.222695] proc_fail_nth_read+0x1a6/0x290 [ 1926.223026] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1926.223398] ? security_file_permission+0xb5/0xe0 [ 1926.223771] vfs_read+0x1de/0x8f0 [ 1926.224033] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1926.224397] ? __pfx_vfs_read+0x10/0x10 [ 1926.224702] ? lock_release+0x1e3/0x680 [ 1926.225001] ? __fget_files+0x267/0x480 [ 1926.225304] ksys_read+0x122/0x250 [ 1926.225580] ? __pfx_ksys_read+0x10/0x10 [ 1926.225888] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1926.226281] do_syscall_64+0x3f/0x90 [ 1926.226577] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1926.226958] RIP: 0033:0x7f64b6ff569c [ 1926.227234] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1926.228538] RSP: 002b:00007f64b4597170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1926.229081] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f64b6ff569c [ 1926.229581] RDX: 000000000000000f RSI: 00007f64b45971e0 RDI: 0000000000000004 [ 1926.230077] RBP: 00007f64b45971d0 R08: 0000000000000000 R09: 0000000000000000 [ 1926.230574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1926.231077] R13: 00007ffdccf5e13f R14: 00007f64b4597300 R15: 0000000000022000 [ 1926.231592] 01:29:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6ce", 0x9f}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:49 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:50 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:50 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:29:50 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:29:50 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618", 0x2, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:50 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:29:50 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 1926.669104] syz-executor.2[46500]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1926.684886] ieee802154 phy0 wpan0: encryption failed: -22 [ 1926.776575] ieee802154 phy0 wpan0: encryption failed: -22 01:30:03 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 6: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x31, 0x0, &(0x7f0000000880)) r0 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0xc525eb3948d66b48, r0}) r1 = getpid() r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x800448d2, &(0x7f0000000000)="8a") r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x240900, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000440)) ioctl$sock_bt_hci(r2, 0x0, &(0x7f0000000340)="6b9fca3eace58245a9382b174dd15da5c8d33ec28d23d875c754bf053a28cf846880f29e9d9f3a0bbf515b71d0ab8af13d32ddf3b59035846152a4480d73f8af687c9e0ea1f10a07ec60e8372b982f6f75cdb9779dee810e45aa4d4cdc108331cb6366eec70c81650585482eaefeccd815953d14823efedac91ae4a53f73eb6e8b66b7f64ee9bc81746a4a1942a5656ea1977a3a02") sendfile(r4, 0xffffffffffffffff, 0x0, 0x10000027f) dup(r4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000001d9af1a6b000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00']) ioctl$sock_bt_hci(r6, 0x800448d7, &(0x7f0000000180)="9d630e39a5034eaaff364b8736e8c7fcc02814efb520189a2012f4a963d40fe26b7b17b9f5354a4bff2d3f46d9e320b4908a4e799b7f971e55b8a4acede8318cafe6bf3d3fceaed508d916e7f286bc5f68ddc03a5a188fcd58bd3a4b98e966ad67bb152d51251489a81c559d452d8652344845f929d2bd845429ac93ca5118e91f879c81f5808096c447b007e717e214151010ca9e22a7ed30e6bdc732201ad5da282709f9f5070dcb98f16aa8f5a8be5eb3c770a7c96a582b5f6cb93bdb9561b6383cdbc9dd5278e3b72abbc7452576b8e9fc5093fa15580a153751") r7 = syz_open_dev$vcsn(&(0x7f0000000100), 0xa0a3, 0x2ac200) getsockopt$bt_sco_SCO_CONNINFO(r7, 0x11, 0x2, &(0x7f0000000280)=""/135, &(0x7f0000000140)=0x87) process_vm_readv(r1, &(0x7f0000000380), 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/4113, 0x1011}], 0x1, 0x0) 01:30:03 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618", 0x2, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:03 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b73", 0xba}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:03 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1939.489860] ieee802154 phy0 wpan0: encryption failed: -22 [ 1939.511494] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO 01:30:03 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x6, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1939.642209] ieee802154 phy0 wpan0: encryption failed: -22 [ 1939.645253] syz-executor.2[46732]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1939.716368] program syz-executor.5 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1939.733709] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1939.745309] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO 01:30:03 executing program 6: r0 = getpid() process_vm_writev(r0, &(0x7f0000000900)=[{&(0x7f00000019c0)=""/204, 0xcc}, {&(0x7f0000001ac0)=""/245, 0xf5}], 0x2, &(0x7f000001bd40)=[{&(0x7f0000001bc0)=""/97, 0x61}, {&(0x7f000001bc80)=""/157, 0x9d}], 0x2, 0x0) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)=""/119, 0x77}, {&(0x7f0000000340)=""/100, 0x64}, {&(0x7f00000005c0)=""/54, 0x36}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f0000001c80)=""/102400, 0x19000}], 0x5, 0x4, 0x800) preadv(0xffffffffffffffff, &(0x7f0000001940)=[{&(0x7f00000003c0)=""/36, 0x24}, {&(0x7f0000000640)=""/191, 0xbf}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f00000007c0)=""/88, 0x58}, {&(0x7f0000000840)=""/122, 0x7a}, {&(0x7f00000008c0)=""/26, 0x1a}, {&(0x7f000001ac80)=""/4096, 0x1000}], 0x8, 0x0, 0x7) r1 = getpid() pidfd_open(r1, 0x0) ptrace$getregset(0x4204, r1, 0x6, &(0x7f0000000580)={&(0x7f00000004c0)=""/25, 0x19}) 01:30:03 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:03 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x6, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1939.926282] ieee802154 phy0 wpan0: encryption failed: -22 01:30:03 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x6, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b73", 0xba}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1939.988713] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO 01:30:03 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0xffffffffffffffff, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:03 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:03 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1940.226570] ieee802154 phy0 wpan0: encryption failed: -22 [ 1940.229949] syz-executor.2[47055]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1940.245755] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1940.259128] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1940.291256] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1940.321591] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO 01:30:20 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0xffffffffffffffff, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:20 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000240)=[{&(0x7f0000000540)=""/260, 0x104}, {&(0x7f0000000440)=""/211, 0xd3}, {&(0x7f0000000280)=""/120, 0x78}, {&(0x7f0000000000)=""/163, 0xa3}], 0x4, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) fork() r1 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x208081) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/80, 0x50}], 0x2, 0xc5c, 0xf8) 01:30:20 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x6, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:20 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:20 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, 0x0) r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:20 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b73", 0xba}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:20 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:30:20 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/181, 0xb5}, {&(0x7f0000000400)=""/137, 0x89}, {&(0x7f00000004c0)=""/15, 0xf}, {&(0x7f0000000500)=""/28, 0x1c}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000640)=""/209, 0xd1}], 0x6, &(0x7f00000007c0)=""/191, 0xbf}, 0x41) r1 = getpid() pidfd_open(r1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000019c0)=0x0) kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) r3 = accept4$unix(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000001940)=0x6e, 0x80800) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000001980)) [ 1956.648068] syz-executor.2[47168]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1956.683424] ieee802154 phy0 wpan0: encryption failed: -22 [ 1956.702098] ieee802154 phy0 wpan0: encryption failed: -22 [ 1956.717355] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO 01:30:20 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0xffffffffffffffff, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:34 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, 0x0) r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:34 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 6: process_vm_readv(0x0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000002c80)=""/4095, 0xfff}], 0x1, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x10000027f) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000700)=""/245, 0xf5}], 0x1, 0x8, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000140), 0xc0000, 0x0) preadv(r3, &(0x7f0000000580)=[{&(0x7f0000000400)=""/224, 0xe0}, {&(0x7f0000000800)=""/123, 0x7b}, {&(0x7f0000000640)=""/189, 0xbd}], 0x3, 0x81, 0x6) preadv(r2, &(0x7f0000000800), 0x0, 0x2, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0x2, 0x0, 0x6) 01:30:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b8", 0xc7}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1970.709457] ieee802154 phy0 wpan0: encryption failed: -22 [ 1970.751706] ieee802154 phy0 wpan0: encryption failed: -22 01:30:34 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1970.807606] syz-executor.2[47407]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:30:34 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b8", 0xc7}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1260, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1260, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:30:34 executing program 6: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x12d) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x142, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_LINK={0x8, 0x1, r2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r4) sendmsg$IEEE802154_LIST_IFACE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="ffff00000000000000001f"], 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000080) fcntl$dupfd(r0, 0x406, r1) r6 = getpid() process_vm_readv(r6, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 1971.331623] syz-executor.2[47718]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:30:35 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, 0x0) r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:35 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, 0x0) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:30:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b8", 0xc7}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 1971.578490] ieee802154 phy0 wpan0: encryption failed: -22 [ 1971.628155] ieee802154 phy0 wpan0: encryption failed: -22 [ 1971.703857] syz-executor.2[47740]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 1974.725353] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1974.727112] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1974.729107] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1974.735942] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1974.740556] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1974.743334] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1976.761777] Bluetooth: hci3: command 0x0409 tx timeout [ 1978.810477] Bluetooth: hci3: command 0x041b tx timeout [ 1980.859064] Bluetooth: hci3: command 0x040f tx timeout [ 1982.905756] Bluetooth: hci3: command 0x0419 tx timeout [ 2006.543593] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2006.544685] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2006.703782] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2006.704736] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2014.690331] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:31:26 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1261, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1261, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 6: r0 = getpid() ioprio_set$pid(0x3, r0, 0x0) process_vm_readv(r0, &(0x7f0000000380)=[{&(0x7f0000000240)=""/234, 0xea}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000000340)=""/48, 0x30}], 0x3, &(0x7f0000000200)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000440)=""/265, 0x109}, {&(0x7f00000003c0)=""/95, 0x5f}, {&(0x7f0000000180)=""/113, 0x71}], 0x4, 0x0) 01:31:26 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, 0x0) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:26 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x125f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8a", 0xce}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(0x0, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:26 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1260, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2022.880444] syz-executor.2[48416]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:31:26 executing program 6: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002dc0)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000000640)=[{&(0x7f0000000340)=""/185, 0xb9}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f00000004c0)=""/35, 0x23}, {&(0x7f0000000500)=""/217, 0xd9}], 0x4, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f0000000700), 0x6e, &(0x7f0000001a00)=[{&(0x7f0000000780)=""/137, 0x89}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000000840)=""/195, 0xc3}, {&(0x7f0000001940)=""/17, 0x11}, {&(0x7f0000001980)=""/106, 0x6a}], 0x5, &(0x7f0000001a80)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001ac0), 0x6e, &(0x7f0000001c00)=[{&(0x7f0000001b40)=""/131, 0x83}], 0x1, &(0x7f0000002c80)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0x3, 0x0, &(0x7f0000002e80)) getsockname$packet(r0, &(0x7f0000002ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002f00)=0x14) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2022.942912] ieee802154 phy0 wpan0: encryption failed: -22 [ 2022.957111] ieee802154 phy0 wpan0: encryption failed: -22 01:31:26 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1262, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8a", 0xce}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1261, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2023.086653] syz-executor.2[48436]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:31:26 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000740)=""/264, 0x108}, {&(0x7f0000000640)=""/219, 0xdb}, {&(0x7f0000000000)=""/141, 0x86}], 0x10000118, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)=""/203, 0xcb}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000540)=""/120, 0x78}], 0x4, 0x81, 0x101) 01:31:26 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1260, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8a", 0xce}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(0x0, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:26 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1262, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:26 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1262, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2023.294486] ieee802154 phy0 wpan0: encryption failed: -22 [ 2023.462450] syz-executor.2[48705]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:31:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16", 0xd1}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:41 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, 0x0) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:41 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1263, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:41 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/250, 0xfa}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:31:41 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(0x0, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:41 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1263, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:41 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1263, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:31:41 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1261, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2038.001611] ieee802154 phy0 wpan0: encryption failed: -22 [ 2038.101304] ieee802154 phy0 wpan0: encryption failed: -22 01:31:41 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1264, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2038.155091] syz-executor.2[48777]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:31:57 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(0x0, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:57 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1262, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1265, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1264, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 6: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0xa2b, &(0x7f0000000340)={0x3c, 0x7ff, 0x10001}) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) ptrace$getsig(0x4202, r0, 0xfffffffffffffff9, &(0x7f0000000100)) 01:31:57 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1264, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16", 0xd1}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2053.565167] ieee802154 phy0 wpan0: encryption failed: -22 [ 2053.584434] syz-executor.2[48979]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2053.663069] ieee802154 phy0 wpan0: encryption failed: -22 01:31:57 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1263, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(0x0, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:57 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1267, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16", 0xd1}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 6: r0 = getpid() ioprio_get$pid(0x1, r0) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:31:57 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1265, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2053.856632] ieee802154 phy0 wpan0: encryption failed: -22 [ 2053.870330] syz-executor.2[49022]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:31:57 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1265, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1268, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:31:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d", 0xd3}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1267, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1264, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:31:57 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, 0x0, 0x10000027f) socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r5 = getpid() pidfd_open(r5, 0x0) process_vm_writev(r5, &(0x7f0000001a40)=[{&(0x7f0000000580)=""/70, 0x46}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000640)=""/224, 0xe0}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000000740)=""/237, 0xed}, {&(0x7f0000000840)=""/78, 0x4e}, {&(0x7f00000008c0)=""/59, 0x3b}, {&(0x7f0000000900)=""/52, 0x34}, {&(0x7f0000001940)=""/202, 0xca}], 0xa, &(0x7f0000004d80)=[{&(0x7f0000001b00)=""/28, 0x1c}, {&(0x7f0000001b40)=""/116, 0x74}, {&(0x7f0000001bc0)=""/67, 0x43}, {&(0x7f0000004c80)=""/147, 0x93}, {&(0x7f0000004d40)=""/62, 0x3e}], 0x5, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) mq_getsetattr(r1, &(0x7f0000004e00)={0x7, 0x400, 0x8, 0x7}, &(0x7f0000004e40)) r7 = dup(r6) sendfile(r7, r4, 0x0, 0x10000027f) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f0000000540)=""/59) preadv(r3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/212, 0xd4}, {&(0x7f0000000440)=""/139, 0x8b}, {&(0x7f0000000100)=""/109, 0x6d}], 0x3, 0x7fffffff, 0x9000) 01:31:57 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1269, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2054.229015] syz-executor.2[49175]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2054.281170] ieee802154 phy0 wpan0: encryption failed: -22 01:32:11 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1274, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1267, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:11 executing program 6: getpid() r0 = getpid() pidfd_open(r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) getpid() 01:32:11 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(0x0, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:11 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1268, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d", 0xd3}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1265, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2068.021311] syz-executor.2[49336]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2068.046442] ieee802154 phy0 wpan0: encryption failed: -22 [ 2068.054516] ieee802154 phy0 wpan0: encryption failed: -22 01:32:11 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfffffffffffffe32}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:32:11 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1268, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1267, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d", 0xd3}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1276, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:11 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1269, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:12 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, 0x0, 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2068.373248] syz-executor.2[49628]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2068.438559] ieee802154 phy0 wpan0: encryption failed: -22 01:32:28 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000340)=""/252, 0xfb}, {&(0x7f0000000100)=""/233, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0xfc5, 0x0) 01:32:28 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, 0x0, 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:28 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1269, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1277, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, 0x0, 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1274, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1268, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2084.458179] ieee802154 phy0 wpan0: encryption failed: -22 01:32:28 executing program 6: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, r0, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8000}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x81}, 0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2084.575039] ieee802154 phy0 wpan0: encryption failed: -22 [ 2084.589337] syz-executor.2[49797]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:32:28 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, 0x0, 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:28 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1278, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1276, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1269, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1274, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 6: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2084.913152] syz-executor.2[50001]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:32:28 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1279, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, 0x0, 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2084.935835] ieee802154 phy0 wpan0: encryption failed: -22 01:32:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1276, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:28 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1277, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2085.199504] ieee802154 phy0 wpan0: encryption failed: -22 01:32:28 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, 0x0, 0x10000027f) preadv(r3, &(0x7f0000000500)=[{&(0x7f0000000100)=""/103, 0x67}, {&(0x7f0000000340)=""/85, 0x55}, {&(0x7f00000003c0)=""/130, 0x82}, {&(0x7f0000000480)}, {&(0x7f00000004c0)=""/13, 0xd}], 0x5, 0x3ff, 0x0) [ 2085.232213] syz-executor.2[50110]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:32:28 executing program 6: r0 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xa, 0x1, 0x7, 0x8, 0x0, 0x0, 0x844e8, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x1, @perf_config_ext={0x5, 0x101}, 0x0, 0x8, 0x1, 0x3, 0x10000, 0x5, 0x1fc, 0x0, 0x8, 0x0, 0x5}, r0, 0x3, 0xffffffffffffffff, 0x2) socket$inet_icmp_raw(0x2, 0x3, 0x1) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2096.825766] Bluetooth: hci3: command 0x0406 tx timeout 01:32:44 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1274, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x0, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:44 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, 0x0, 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:44 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1278, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 6: r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/pid_for_children\x00') process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000400)=""/211, 0xd3}, {&(0x7f0000000340)=""/140, 0x8c}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4084, 0xff4}], 0x1, 0x0) 01:32:44 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1277, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2100.391241] ieee802154 phy0 wpan0: encryption failed: -22 01:32:44 executing program 6: r0 = getpid() pidfd_open(r0, 0x0) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2100.475079] ieee802154 phy0 wpan0: encryption failed: -22 01:32:44 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1278, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2100.534020] syz-executor.2[50257]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:32:44 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1276, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x0, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2100.640560] ieee802154 phy0 wpan0: encryption failed: -22 01:32:44 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1279, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1279, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:44 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/197, 0xc5}], 0x4, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x101082, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x7f, 0x0, 0x2, 0x1, 0x0, 0xff, 0x30008, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0x3, 0x9}, 0x10200, 0x7, 0x0, 0x0, 0x42, 0x8, 0x1c4a, 0x0, 0x8, 0x0, 0xa6a}, r0, 0xe, r1, 0x9) r2 = getpid() pidfd_open(r2, 0x0) setpriority(0x1, r2, 0x10001) [ 2100.925268] syz-executor.2[50543]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:32:57 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x0, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:57 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:57 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:57 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x0, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:32:57 executing program 6: r0 = syz_open_dev$vcsu(&(0x7f0000000100), 0x1, 0x2002) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x2000006, 0x7d}}}}, [@NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_BSSID={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x8010}, 0x4c064) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:32:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:57 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:57 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1277, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:57 executing program 6: r0 = getpid() gettid() getpid() r1 = getpid() pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0xbbf) r5 = getpid() r6 = pidfd_open(r5, 0x0) pidfd_open(r5, 0x0) pidfd_send_signal(r4, 0x29, &(0x7f0000000100)={0x2, 0xf3, 0x5}, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r6, 0x82307202, &(0x7f0000000340)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 2114.170681] ieee802154 phy0 wpan0: encryption failed: -22 [ 2114.191300] ieee802154 phy0 wpan0: encryption failed: -22 01:32:57 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1278, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2114.274640] syz-executor.2[50587]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:32:57 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) ptrace$getregset(0x4204, r0, 0x6, &(0x7f0000000140)={&(0x7f0000000100)}) 01:32:58 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:58 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) r2 = getpid() pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) capset(&(0x7f0000000100)={0x20080522, r0}, &(0x7f0000000140)={0x8, 0x4, 0x51f, 0x100, 0x7f, 0x2}) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:32:58 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:32:58 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:32:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2114.593179] syz-executor.2[50806]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:33:11 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x0, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:33:11 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x1279, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x0, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:33:11 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x5, 0xf8, 0x7, 0x0, 0x5, 0x22000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x0, @perf_config_ext={0x8a6, 0x5}, 0x1, 0x1, 0x2, 0x1, 0x3, 0x1, 0x1}, r1, 0xd, 0xffffffffffffffff, 0x9) [ 2128.088182] ieee802154 phy0 wpan0: encryption failed: -22 [ 2128.131902] syz-executor.2[50818]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2128.159592] ieee802154 phy0 wpan0: encryption failed: -22 01:33:11 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2201, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:11 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001c80)={0x8010}) r3 = getpid() r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000100)=0x4) process_vm_readv(r3, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:33:12 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:12 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2128.454137] syz-executor.2[50929]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:33:30 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000100)=0x8, 0x4) getpid() 01:33:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, 0x0) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:33:30 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:33:30 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{0x0, 0x0, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2146.426097] ieee802154 phy0 wpan0: encryption failed: -22 [ 2146.523178] ieee802154 phy0 wpan0: encryption failed: -22 [ 2146.558893] syz-executor.2[51057]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:33:30 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) r2 = openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={0x77a5acb399317e15, 0x7a, 0x13}, 0x18) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x5, 0x1, 0x7f, 0x9e, 0x0, 0x40, 0x81040, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x2, 0x0, 0x5, 0x3, 0x8, 0x40, 0x20, 0x0, 0xffff0001, 0x0, 0x5}, r1, 0xb, r2, 0x8) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:33:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{0x0, 0x0, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:33:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2203, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2146.960419] syz-executor.2[51355]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:33:47 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:33:47 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, 0x0) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:33:47 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:47 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:47 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{0x0, 0x0, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:47 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:33:47 executing program 6: lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000340)=@ng={0x4, 0x1, "39d98023c3ccc6e01088ef09b3046a40c349"}, 0x14, 0x2) r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2164.137008] ieee802154 phy0 wpan0: encryption failed: -22 [ 2164.194425] ieee802154 phy0 wpan0: encryption failed: -22 01:33:47 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2164.269058] syz-executor.2[51422]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:33:47 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:47 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x5]}, 0x8, 0x0) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) 01:33:47 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2201, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:33:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340), 0x0, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2164.603791] syz-executor.2[51615]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:34:04 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:04 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2201, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340), 0x0, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2282, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, 0x0) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:04 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x127f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) ptrace$setregset(0x4205, r0, 0x2, &(0x7f0000000340)={&(0x7f0000000100)="07fee014f01263c4e724e75aad6d916bd2ad81b66ac4634c81b432512518b48de66b270dfb8ffc8161d1efc628a8c6f45f98e8e9b8ad52ac1f183a936cb364051b3bab89d9e59a7185c4bfa567bb5c5ec3c3034defd78ca28649fa11b5aece8f01b2db28c9233335979dd1384fa640830f278b7de69031d0ba4d8f9445", 0x7d}) 01:34:04 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2180.947049] ieee802154 phy0 wpan0: encryption failed: -22 01:34:04 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2181.007621] ieee802154 phy0 wpan0: encryption failed: -22 [ 2181.060361] syz-executor.2[51643]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:34:04 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000100)=""/86, 0x56}], 0x4, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r1, &(0x7f0000000000)={0x24, @long}, 0x11) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000100)=0x3) readv(r1, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/163, 0xa3}, {&(0x7f0000000440)=""/73, 0x49}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000001c80)=""/4095, 0xfff}], 0x4) 01:34:04 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2201, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2203, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, 0x0) r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:04 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2203, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340), 0x0, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2181.293380] ieee802154 phy0 wpan0: encryption failed: -22 01:34:05 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:05 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r2 = getpid() pidfd_open(r2, 0x0) wait4(r2, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r3 = fork() ptrace(0x10, r3) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:05 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2181.429560] syz-executor.2[51872]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2181.454365] ieee802154 phy0 wpan0: encryption failed: -22 01:34:05 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:05 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:05 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b47, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32", 0x15, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:05 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2203, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2181.664482] syz-executor.2[52002]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:34:20 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r2 = getpid() pidfd_open(r2, 0x0) wait4(r2, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r3 = fork() ptrace(0x10, r3) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:20 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, 0x0) r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:20 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2282, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32", 0x15, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 6: sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x64, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x24, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x0, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xfffffffffffffe18, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x500000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4a68}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x64}}, 0x22040084) r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:34:20 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b49, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2196.521363] ieee802154 phy0 wpan0: encryption failed: -22 [ 2196.530084] ieee802154 phy0 wpan0: encryption failed: -22 [ 2196.534248] syz-executor.2[52082]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:34:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32", 0x15, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) tgkill(r1, r2, 0x1d) 01:34:20 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2196.782575] syz-executor.2[52316]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:34:20 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:20 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, 0x0) r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2196.962543] ieee802154 phy0 wpan0: encryption failed: -22 01:34:37 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r2 = getpid() pidfd_open(r2, 0x0) wait4(r2, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r3 = fork() ptrace(0x10, r3) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49", 0x20, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(0x0, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:37 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2282, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2282, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5302, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 6: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) ptrace$cont(0x7, r1, 0x6, 0x5) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="5065df8b3758da5ca77bd8bea0cf8938f32fb22f61910dde711c0845b13dec910d4cdd432ac1fed9b936ed1c59067afd5219e4738fe879f2d1c874b8cbb11ebdb2214c3c7f032921dda4bb409043bbf2e84598978ffaf7c89aa9d53360d38920472bd97b4067bad0f7b6", @ANYRES16=r2, @ANYBLOB="010000000000000000006500000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000000000000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x7c, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x3a}, @void, @val={0xc, 0x99, {0x8, 0x5}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x25}, @NL80211_ATTR_PID={0x8, 0x52, r1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x2a}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6c}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_NETNS_FD={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x69}]}, 0x7c}}, 0x20000804) r5 = getpid() getsockopt$IP_SET_OP_GET_BYNAME(r3, 0x1, 0x53, &(0x7f0000000440)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000480)=0x28) process_vm_readv(r5, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000340)=""/148, 0x94}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4085, 0xff5}], 0x1, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000004c0), 0x80600, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r6, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x4000) [ 2213.844952] ieee802154 phy0 wpan0: encryption failed: -22 01:34:37 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000000140)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x1, 0x1f, 0x2, 0x1f, 0x0, 0xfe2, 0x90181, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x81, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x11200, 0x2, 0x1f, 0x7, 0x6, 0x40, 0x2, 0x0, 0x9, 0x0, 0x6}, r0, 0x2, 0xffffffffffffffff, 0x1) [ 2213.912876] ieee802154 phy0 wpan0: encryption failed: -22 01:34:37 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2213.951793] syz-executor.2[52526]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:34:37 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b47, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5303, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 6: r0 = getpid() r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x5, 0xff, 0x81, 0x0, 0x0, 0x0, 0x44041, 0xa9747ae51b4633c2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc7, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x8020, 0x8, 0x4, 0x5, 0x101, 0x0, 0x4, 0x0, 0x5f, 0x0, 0x5}, r0, 0x1, r1, 0xa) process_vm_readv(r0, &(0x7f0000000600), 0x0, &(0x7f0000000000)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:34:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49", 0x20, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:37 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:37 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b49, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2214.273117] syz-executor.2[52733]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2214.323115] ieee802154 phy0 wpan0: encryption failed: -22 01:34:52 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5304, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:52 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(0x0, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:52 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:34:52 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000740), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="ffff00000000000000001f"], 0x14}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x34, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x8180}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000f40), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000380)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)={0xfffffffffffffd54, r6, 0x301, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r4, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x2005}, 0x2004000) r10 = getpid() process_vm_readv(r10, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:34:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49", 0x20, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:52 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:52 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b47, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:52 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2228.996163] syz-executor.2[52866]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2228.997120] ieee802154 phy0 wpan0: encryption failed: -22 [ 2229.012111] ieee802154 phy0 wpan0: encryption failed: -22 01:34:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4", 0x25, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:34:52 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b47, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2229.372418] syz-executor.2[53136]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:08 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:08 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5305, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:08 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b49, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:08 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(0x0, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:08 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5302, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:35:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4", 0x25, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:08 executing program 6: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10001}}, './file0\x00'}) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x4810) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000340)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x0, 0x1, 0x0, 0x0, 0xff, 0x8, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x10001}, 0xa02, 0x7, 0x40, 0x9, 0x12, 0x3, 0x84, 0x0, 0x7, 0x0, 0x428}, r1, 0x6, 0xffffffffffffffff, 0x9) 01:35:08 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4b49, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2245.368213] ieee802154 phy0 wpan0: encryption failed: -22 [ 2245.398384] syz-executor.2[53190]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:09 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5306, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2245.484507] ieee802154 phy0 wpan0: encryption failed: -22 01:35:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4", 0x25, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:09 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2245.575857] ieee802154 phy0 wpan0: encryption failed: -22 [ 2245.711276] syz-executor.2[53273]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:22 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5303, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 6: r0 = getpid() r1 = gettid() getpgrp(r1) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) 01:35:22 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:22 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5301, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5307, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fba", 0x28, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:22 executing program 6: r0 = getpid() fcntl$getown(0xffffffffffffffff, 0x9) process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000340)=""/134, 0x86}], 0x3, &(0x7f0000001c40), 0x0, 0x0) [ 2258.699825] ieee802154 phy0 wpan0: encryption failed: -22 [ 2258.767165] ieee802154 phy0 wpan0: encryption failed: -22 01:35:22 executing program 6: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000100)=0x4, 0x12) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000340)=""/253, 0xfd}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) [ 2258.797365] syz-executor.2[53594]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:22 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5308, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5304, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5302, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 6: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000780)={'syztnl1\x00', 0x0, 0x4, 0x20, 0x3, 0xe65, 0x4, @local, @mcast1, 0x40, 0x8, 0x2, 0x7}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000008c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="a0000000", @ANYRES16=0x0, @ANYBLOB="10002bbd7000fedbdf25020000008000018008000100", @ANYRES32=r0, @ANYBLOB="0800030001000000140002006c6f0000000000000000000000000008140002006970766c616e310000000000000000001400020065727370616e300000000000000000001400020076657468315f746f5f68737200000000140002007767310000000008000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=0x0, @ANYBLOB], 0xa0}, 0x1, 0x0, 0x0, 0x8095}, 0x20000000) r1 = getpid() process_vm_readv(r1, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) pidfd_open(r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001c80)=""/4096, 0x1000}], 0x1, 0x8, 0x1) r2 = io_uring_setup(0x1a99, &(0x7f0000000340)={0x0, 0x5492, 0x2, 0x0, 0x22d}) preadv(r2, &(0x7f0000000700)=[{&(0x7f00000003c0)=""/205, 0xcd}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/239, 0xef}, {&(0x7f0000000640)=""/181, 0xb5}], 0x5, 0xfffffffe, 0x7fffffff) 01:35:22 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:22 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5302, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:22 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fba", 0x28, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2259.098614] ieee802154 phy0 wpan0: encryption failed: -22 01:35:22 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:22 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) r5 = getpid() pidfd_open(r5, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:35:22 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5303, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2259.216658] syz-executor.2[53856]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2259.235865] ieee802154 phy0 wpan0: encryption failed: -22 01:35:22 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5309, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:23 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2259.452033] ieee802154 phy0 wpan0: encryption failed: -22 01:35:38 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5305, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:35:38 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, 0x0, 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:38 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:38 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5303, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fba", 0x28, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:38 executing program 6: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000340)={0x87, 0x29, 0x1, {0x4, [{{0x2, 0x2, 0x3}, 0xffff, 0xff, 0x7, './file0'}, {{0x0, 0x1, 0x5}, 0x1fc00, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x6}, 0x1, 0x40, 0x7, './file0'}, {{0x1, 0x3}, 0x93, 0x80, 0x7, './file0'}]}}, 0x87) r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, 0x0, 0x10000027f) preadv(r3, &(0x7f0000000400)=[{&(0x7f0000000100)=""/113, 0x71}], 0x1, 0x2, 0x10000) 01:35:38 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(0x0, 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:38 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5304, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2274.913248] ieee802154 phy0 wpan0: encryption failed: -22 [ 2275.045918] ieee802154 phy0 wpan0: encryption failed: -22 [ 2275.090404] syz-executor.2[53996]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:53 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5305, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:53 executing program 6: r0 = getpid() process_vm_readv(r0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/251, 0xfb}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000280)=""/134, 0x86}], 0x3, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000100)=0x21) 01:35:53 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5306, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:35:53 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(0x0, 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:53 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, 0x0, 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:35:53 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5304, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0", 0x29, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:53 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2290.187109] ieee802154 phy0 wpan0: encryption failed: -22 01:35:53 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5305, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:53 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, 0x0, 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2290.320975] ieee802154 phy0 wpan0: encryption failed: -22 [ 2290.343768] syz-executor.2[54014]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:54 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:54 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) r5 = getpid() pidfd_open(r5, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) [ 2290.447052] ieee802154 phy0 wpan0: encryption failed: -22 01:35:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0", 0x29, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:54 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5307, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2290.549236] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2290.614775] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2290.669061] syz-executor.2[54247]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:35:54 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5306, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:54 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5306, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:54 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) r5 = getpid() pidfd_open(r5, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:35:54 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0", 0x29, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:35:54 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(0x0, 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2291.017921] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2291.040179] syz-executor.2[54343]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2291.070079] ieee802154 phy0 wpan0: encryption failed: -22 01:36:07 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5307, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5308, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:07 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5307, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) r5 = getpid() pidfd_open(r5, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:07 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x0, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2303.926039] syz-executor.2[54552]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2303.931391] ieee802154 phy0 wpan0: encryption failed: -22 [ 2303.964487] ieee802154 phy0 wpan0: encryption failed: -22 01:36:07 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) getpid() preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:07 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5308, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5309, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:36:07 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5308, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2304.191696] syz-executor.2[54647]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:36:07 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x0, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:07 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) perf_event_open(0x0, 0x0, 0x6, r2, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:08 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2304.445175] ieee802154 phy0 wpan0: encryption failed: -22 [ 2304.471614] syz-executor.2[54884]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2304.525269] ieee802154 phy0 wpan0: encryption failed: -22 01:36:23 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5309, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:23 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5310, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:23 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:36:23 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x0) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:23 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x0, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:23 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5309, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:23 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, 0x0, 0x10000027f) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, 0x0) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:23 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r3) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) [ 2319.785077] ieee802154 phy0 wpan0: encryption failed: -22 01:36:23 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5311, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2319.808245] syz-executor.2[55101]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2319.834315] ieee802154 phy0 wpan0: encryption failed: -22 01:36:23 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:23 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, 0x0) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:37 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, 0x0) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:37 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:37 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0xffffffffffffffff, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:37 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:37 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:36:37 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5312, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:37 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2334.084067] ieee802154 phy0 wpan0: encryption failed: -22 [ 2334.089197] syz-executor.2[55326]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2334.123977] ieee802154 phy0 wpan0: encryption failed: -22 01:36:37 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:37 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, 0x0) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:37 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:36:38 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:38 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5313, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:38 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, 0x0) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2334.423771] syz-executor.2[55545]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:36:38 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0xffffffffffffffff, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2334.458481] ieee802154 phy0 wpan0: encryption failed: -22 01:36:38 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) [ 2334.479266] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2334.533261] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:36:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2334.564493] ieee802154 phy0 wpan0: encryption failed: -22 01:36:38 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2334.678410] syz-executor.2[55631]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2334.775404] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:36:50 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:50 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0xffffffffffffffff, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:36:50 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:50 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:50 executing program 6: r0 = getpid() r1 = getpid() pidfd_open(r1, 0x0) setpriority(0x1, r1, 0x5) process_vm_readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}], 0x1, &(0x7f0000001c40)=[{&(0x7f0000000940)=""/4095, 0xfff}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:50 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:36:50 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, 0x0) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2347.092055] ieee802154 phy0 wpan0: encryption failed: -22 [ 2347.111335] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2347.153463] ieee802154 phy0 wpan0: encryption failed: -22 [ 2347.160095] syz-executor.2[55778]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:36:50 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2347.192336] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2347.222701] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:36:50 executing program 6: getpid() r0 = getpid() pidfd_open(r0, 0x0) setpriority(0x1, r0, 0x5) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) [ 2347.272590] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:36:50 executing program 6: getpid() r0 = getpid() pidfd_open(r0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:51 executing program 6: getpid() getpid() r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:36:51 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:36:51 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:04 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5319, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5310, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 6: getpid() r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:37:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) fork() ptrace(0x10, 0x0) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2360.991541] ieee802154 phy0 wpan0: encryption failed: -22 01:37:04 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) [ 2361.086592] ieee802154 phy0 wpan0: encryption failed: -22 [ 2361.098498] syz-executor.2[56015]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:37:04 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5311, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2361.136781] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:37:04 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5320, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:37:04 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530e, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:05 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:05 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5310, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2361.420259] syz-executor.2[56195]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:37:05 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5312, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2361.565572] ieee802154 phy0 wpan0: encryption failed: -22 01:37:18 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5321, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:18 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:18 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5311, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:18 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:18 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:37:18 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) fork() ptrace(0x10, 0x0) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:18 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5313, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2374.650297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2374.651034] ieee802154 phy0 wpan0: encryption failed: -22 [ 2374.753214] syz-executor.2[56354]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:37:18 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:37:18 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5312, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:18 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:18 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:18 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) fork() ptrace(0x10, 0x0) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:18 executing program 6: openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) [ 2374.954340] ieee802154 phy0 wpan0: encryption failed: -22 01:37:18 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2375.145431] ieee802154 phy0 wpan0: encryption failed: -22 [ 2375.184145] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2375.227338] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:37:35 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5313, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 6: openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:37:35 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, 0x0, 0x8, &(0x7f0000000500)) 01:37:35 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:35 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5323, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5310, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2391.705086] ieee802154 phy0 wpan0: encryption failed: -22 [ 2391.731697] syz-executor.2[56889]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2391.760453] ieee802154 phy0 wpan0: encryption failed: -22 01:37:35 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5325, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 6: openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}, {&(0x7f0000000500)=""/224, 0xe0}], 0x9, 0x2, 0x9) 01:37:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(0xffffffffffffffff, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r2, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5319, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5311, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:35 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2392.043982] syz-executor.2[57064]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2392.076703] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:37:35 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, 0x0, 0x8, &(0x7f0000000500)) 01:37:35 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x2, 0x9) 01:37:35 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2392.164740] ieee802154 phy0 wpan0: encryption failed: -22 [ 2392.165700] ieee802154 phy0 wpan0: encryption failed: -22 01:37:35 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5320, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:49 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5327, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(0xffffffffffffffff, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r2, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:49 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, 0x0, 0x8, &(0x7f0000000500)) 01:37:49 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:37:49 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5312, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:49 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:37:49 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5321, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:37:49 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x2, 0x9) [ 2406.360106] ieee802154 phy0 wpan0: encryption failed: -22 [ 2406.432399] ieee802154 phy0 wpan0: encryption failed: -22 [ 2406.487138] syz-executor.2[57353]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:37:50 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5313, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:05 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5328, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5319, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)) 01:38:05 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x2, 0x9) 01:38:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(0xffffffffffffffff, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r2, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000400)=""/193, 0xc1}], 0x8, 0x2, 0x9) [ 2421.951646] syz-executor.2[57661]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2422.005462] ieee802154 phy0 wpan0: encryption failed: -22 [ 2422.027954] ieee802154 phy0 wpan0: encryption failed: -22 01:38:05 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000000300)=""/199, 0xc7}], 0x7, 0x2, 0x9) [ 2422.043096] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:38:05 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, 0x0, 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2422.128170] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:38:05 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5323, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2422.243960] syz-executor.2[57739]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:05 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5320, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:05 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000002c80)=""/4096, 0x1000}], 0x6, 0x2, 0x9) 01:38:05 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5330, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, 0x0, 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:06 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x0) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:06 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/36, 0x24}], 0x5, 0x2, 0x9) 01:38:06 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5325, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:06 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)) [ 2422.535753] syz-executor.2[57899]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2422.562893] ieee802154 phy0 wpan0: encryption failed: -22 [ 2422.613021] ieee802154 phy0 wpan0: encryption failed: -22 01:38:23 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5321, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(0x0, 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:23 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)) 01:38:23 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5331, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, 0x0, 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5319, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0x4, 0x2, 0x9) 01:38:23 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2439.655117] ieee802154 phy0 wpan0: encryption failed: -22 [ 2439.723550] ieee802154 phy0 wpan0: encryption failed: -22 [ 2439.773278] syz-executor.2[58155]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:23 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}, {&(0x7f0000000200)=""/155, 0x9b}], 0x3, 0x2, 0x9) 01:38:23 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5380, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5320, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5327, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:23 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(0x0, 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:23 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5323, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2440.188209] ieee802154 phy0 wpan0: encryption failed: -22 [ 2440.240566] syz-executor.2[58542]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:36 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:36 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/241, 0xf1}], 0x2, 0x2, 0x9) 01:38:36 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(0x0, 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:36 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5328, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:36 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, 0x0) 01:38:36 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5325, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:36 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5321, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2453.064435] ieee802154 phy0 wpan0: encryption failed: -22 [ 2453.144263] ieee802154 phy0 wpan0: encryption failed: -22 01:38:36 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, 0x2, 0x9) [ 2453.200169] syz-executor.2[58683]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:37 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:37 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5382, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:37 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:37 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2453.737445] syz-executor.2[58883]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:53 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5323, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5330, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600), 0x0, 0x2, 0x9) 01:38:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:53 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, 0x0) 01:38:53 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5327, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5385, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2469.751097] ieee802154 phy0 wpan0: encryption failed: -22 [ 2469.777297] ieee802154 phy0 wpan0: encryption failed: -22 01:38:53 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600), 0x0, 0x2, 0x9) [ 2469.828708] syz-executor.2[58900]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:53 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:38:53 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5331, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5328, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600), 0x0, 0x2, 0x9) 01:38:53 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5325, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:38:53 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5386, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2470.009405] ieee802154 phy0 wpan0: encryption failed: -22 01:38:53 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, 0x0) [ 2470.091224] syz-executor.2[59015]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:38:53 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{0x0}], 0x1, 0x2, 0x9) [ 2470.115384] ieee802154 phy0 wpan0: encryption failed: -22 01:39:09 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5387, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5380, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{0x0}], 0x1, 0x2, 0x9) 01:39:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:39:09 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2485.792961] ieee802154 phy0 wpan0: encryption failed: -22 01:39:09 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{0x0}], 0x1, 0x2, 0x9) [ 2485.866284] syz-executor.2[59235]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:39:09 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000200)=0x1) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:39:09 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5330, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r1, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4001) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r2, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5327, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:09 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5390, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2486.161919] ieee802154 phy0 wpan0: encryption failed: -22 [ 2486.200091] syz-executor.2[59261]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:39:26 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, 0x0, 0x9) 01:39:26 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5382, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:26 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000200)=0x1) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:39:26 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5328, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:26 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5331, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r1, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4001) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r2, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:26 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5392, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:26 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:26 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, 0x0, 0x9) [ 2502.725142] ieee802154 phy0 wpan0: encryption failed: -22 [ 2502.777892] syz-executor.2[59494]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:39:40 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, 0x0, 0x9) 01:39:40 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = fork() ptrace(0x10, r1) wait4(r1, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r3 = getpid() pidfd_open(r3, 0x0) wait4(r3, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r2, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000200)=0x1) r4 = fork() ptrace(0x10, r4) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:39:40 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5385, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r1, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4001) r2 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r2, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5380, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2517.023881] ieee802154 phy0 wpan0: encryption failed: -22 [ 2517.025017] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:39:40 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/schedstat\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, 0x2, 0x0) [ 2517.084303] syz-executor.2[59706]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2517.152103] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:39:40 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5386, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:41 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5395, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:41 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5330, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:41 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:41 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2517.440438] syz-executor.2[59925]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2517.483637] ieee802154 phy0 wpan0: encryption failed: -22 01:39:41 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:41 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5382, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2517.603177] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:39:54 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5387, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5385, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5396, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:39:54 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5331, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2530.611187] ieee802154 phy0 wpan0: encryption failed: -22 [ 2530.645334] syz-executor.2[60045]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:39:54 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 6: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5380, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, 0x0) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2530.862310] syz-executor.2[60166]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:39:54 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5390, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5386, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:39:54 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x541b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2530.962239] ieee802154 phy0 wpan0: encryption failed: -22 01:39:54 executing program 6: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:40:08 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5387, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5392, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 6: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5421, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2544.905237] syz-executor.2[60388]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2544.944065] ieee802154 phy0 wpan0: encryption failed: -22 01:40:08 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5382, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5390, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:08 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5385, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2545.223243] syz-executor.2[60561]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:40:08 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5392, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5386, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5451, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:40:21 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5395, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2557.591148] ieee802154 phy0 wpan0: encryption failed: -22 [ 2557.601836] syz-executor.2[60628]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2557.647062] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:40:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:40:21 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:21 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2557.773636] ieee802154 phy0 wpan0: encryption failed: -22 [ 2557.777623] syz-executor.2[60638]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:40:21 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2558.082510] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:40:33 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5395, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5396, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5452, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5387, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5381, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:33 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0xffffffffffffffff, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2570.183885] ieee802154 phy0 wpan0: encryption failed: -22 [ 2570.285075] syz-executor.2[60780]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:40:33 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0xffffffffffffffff, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:40:33 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:34 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5390, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:34 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5460, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2570.440279] ieee802154 phy0 wpan0: encryption failed: -22 01:40:34 executing program 6: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:34 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x541b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:34 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5381, 0x0) 01:40:48 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5396, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5392, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0xffffffffffffffff, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:40:48 executing program 6: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5421, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40049409, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5395, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2584.664014] ieee802154 phy0 wpan0: encryption failed: -22 [ 2584.731528] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2584.801743] syz-executor.2[61044]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:40:48 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) fork() ptrace(0x10, 0x0) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:40:48 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 6: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5326, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40081271, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:40:48 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x541b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2585.020032] ieee802154 phy0 wpan0: encryption failed: -22 01:40:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2585.107036] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2585.130023] syz-executor.2[61186]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:08 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5395, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40086602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5451, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5326, 0x0) 01:41:08 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) fork() ptrace(0x10, 0x0) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:41:08 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5421, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2604.505649] syz-executor.2[61440]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2604.544506] ieee802154 phy0 wpan0: encryption failed: -22 01:41:08 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5452, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40087602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5396, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2605.186865] syz-executor.6[61740]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:08 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5460, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:08 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2605.284244] syz-executor.2[61771]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:09 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) fork() ptrace(0x10, 0x0) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) [ 2605.417576] ieee802154 phy0 wpan0: encryption failed: -22 01:41:09 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101283, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5451, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, 0x0) 01:41:24 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, 0x0, 0x8, &(0x7f0000000500)) 01:41:24 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101286, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40049409, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x541b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2620.927357] ieee802154 phy0 wpan0: encryption failed: -22 [ 2621.002340] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2621.022543] syz-executor.2[62050]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:24 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101288, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40081271, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5452, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:24 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, 0x0) 01:41:25 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, 0x0, 0x8, &(0x7f0000000500)) 01:41:25 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5421, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:25 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2621.523530] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2621.534651] ieee802154 phy0 wpan0: encryption failed: -22 [ 2621.591639] syz-executor.2[62220]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:39 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070c9, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:39 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, 0x0, 0x8, &(0x7f0000000500)) 01:41:39 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5450, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:39 executing program 6: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:39 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40086602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, 0x0) 01:41:39 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5460, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:39 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2635.727801] ieee802154 phy0 wpan0: encryption failed: -22 [ 2635.746389] syz-executor.2[62342]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:51 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5451, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)) 01:41:51 executing program 6: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070ca, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40087602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40049409, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2647.962143] ieee802154 phy0 wpan0: encryption failed: -22 01:41:51 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 6: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070cd, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101283, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2648.096432] syz-executor.2[62584]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:41:51 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40081271, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5452, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:51 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)) 01:41:51 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:41:52 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2648.401208] ieee802154 phy0 wpan0: encryption failed: -22 01:42:10 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870c8, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40086602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5460, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101286, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x0, &(0x7f0000000500)) 01:42:10 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2667.064257] ieee802154 phy0 wpan0: encryption failed: -22 [ 2667.086853] syz-executor.2[62804]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:42:10 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:10 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, 0x0) [ 2667.316370] ieee802154 phy0 wpan0: encryption failed: -22 01:42:11 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, 0x0) [ 2667.464624] ieee802154 phy0 wpan0: encryption failed: -22 01:42:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:29 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, &(0x7f0000000180)=""/127, 0x7f, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, 0x0) 01:42:29 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:29 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:29 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cb, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:29 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40049409, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:29 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101288, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:29 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40087602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 2686.148105] ieee802154 phy0 wpan0: encryption failed: -22 [ 2686.198402] syz-executor.2[63173]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:42:29 executing program 6: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070c9, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cc, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101283, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40081271, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 7: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000010dc6e00000000000000e1ffffff", @ANYRES16=0x0, @ANYBLOB="000227bd7000ffdbdf2501000000050002000a000000"], 0x1c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000140)={0x24, @short={0x2, 0x3, 0xfffc}}, 0x14) sendto(r0, &(0x7f0000000000)="e618cf", 0x3, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fork() ptrace(0x10, r2) wait4(r2, &(0x7f0000000240), 0x2, &(0x7f0000000300)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = getpid() pidfd_open(r4, 0x0) wait4(r4, &(0x7f0000000280), 0x20000000, &(0x7f00000005c0)) pread64(r3, 0x0, 0x0, 0x5) creat(&(0x7f00000004c0)='./file0\x00', 0x1e6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000200)=0x1) r5 = fork() ptrace(0x10, r5) wait4(0x0, &(0x7f0000000240), 0x8, &(0x7f0000000500)) 01:42:30 executing program 6: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2686.765818] ieee802154 phy0 wpan0: encryption failed: -22 [ 2686.774914] syz-executor.2[63494]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:42:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070ca, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 6: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401c5820, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101286, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40086602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:30 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, 0x0) [ 2687.328233] syz-executor.2[63799]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:42:45 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5394, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:45 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:45 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, 0x0) 01:42:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:45 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070cd, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:45 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101288, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:42:45 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4020940d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:45 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40087602, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2702.329154] syz-executor.2[63813]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:42:46 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, 0x0) 01:42:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:42:46 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:42:46 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2702.676948] syz-executor.2[64128]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:00 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070c9, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101283, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5394, 0x0) 01:43:00 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870c8, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2716.654550] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2716.665839] syz-executor.2[64251]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:00 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101286, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cb, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070ca, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 7: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081270, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5329, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2716.917733] syz-executor.2[64262]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:00 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) [ 2717.187038] syz-executor.2[64278]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:14 executing program 7: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x40101288, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:43:14 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cc, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070cd, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:14 executing program 7: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2731.097217] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2731.126551] syz-executor.2[64359]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:43:14 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2731.533467] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 2731.539263] syz-executor.2[64503]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081280, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5314, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070c9, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870c8, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x5, &(0x7f0000001600)=[{&(0x7f0000000340)="83eeac90dc804e5c295ab85aec01935340a6f0ce32411b204773482e7f0dfd49c68ad788a4861fbad0d6", 0x2a, 0x28f}, {0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x0, 0x0, 0x0, 0x0}) 01:43:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401c5820, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2746.456458] syz-executor.2[64511]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set 01:43:30 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070ca, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80086601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4020940d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 3: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5311, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cb, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:30 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401070cd, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530a, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cc, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80087601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5311, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5310, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x801c581f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:43:44 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870c8, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401c5820, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5310, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0045878, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cb, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 7: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0045878, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:00 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:01 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:01 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4020940d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:01 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081270, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2777.553601] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:44:15 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0101282, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 7: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401870cc, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:15 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5306, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2792.299314] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:44:16 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 7: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0189436, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081280, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5305, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2792.545501] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 01:44:16 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x401c5820, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 2: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, 0x0) 01:44:16 executing program 2: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x4020940d, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 2: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80086601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081270, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5304, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:16 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80087601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 3: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc020660b, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, 0x0) 01:44:30 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:30 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, 0x0) 01:44:44 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80041285, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081280, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, 0x0) 01:44:44 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x801c581f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0481273, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2284, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, 0x0) 01:44:44 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80086601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:44 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081270, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80087601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081272, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, 0x0) 01:44:56 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0045878, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"21766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80081280, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 2: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:56 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0045878, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:57 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:44:57 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x801c581f, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:57 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:44:57 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"28766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80086601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 2: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"2a766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 01:45:12 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0045878, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 6: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2202, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0101282, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 2: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 5: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x80087601, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 4: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0045878, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 2: openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x530c, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x101, 0x60300) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000300)='./file1\x00', 0x2, 0x4, &(0x7f0000001600)=[{0x0, 0x0, 0x64c}, {&(0x7f00000003c0)="9c5dc7462be0e41ab1ae5288b255c1a6c13b0d93289edc254d313234be3dd20fca85ec79258fe351751aad55072d0aadde4ca4679af8a40591b631f340d93af5bad370481fc5480c279bda4a415e86e537927a9f6c484614e3f3741ca877db61216ad4a834b50a59d262e45dd434844b751f82a158fe1a9f41de5baa2f7654ef1dbde43b8d8f6700bb682778f17a0399967d4a9dcefc2d42b97c0291ceb6cedadfd4fc3058e958e7052dc4e610747767edc19f7ea1e375068b736152966c1de97f8e141758a2b810115fb6a6da8aec5e16ba6d86", 0xd4}, {&(0x7f00000014c0), 0x0, 0xf67b}, {&(0x7f0000001500)="5ccaa939dde2d7a929e921b08b3825df15d80a3d0092c73e86989a5cc0c32e31e9d5c94c1ec9dcc6269603a94bc2f454e2ddd806b227e60aa20114a831be7f730b9717a149ebba2deee83608570ca349fca687b472fecdcef60bef36074e91eb5a4146c28515a2634f0ecbabb8f6580cc1719d2bd4d81dba3a8fae249aa8b70d7212e9965d8182341aba8c834841ab7c7e26cdf865e8b8afbda14635e5548eac9860187c355c6b64c9cd5d8a039a91c67d450233a70e9985e7554eb49c6609c4e705448d16c6970d1040b129", 0xcc, 0x4}], 0x0, &(0x7f00000016c0)={[{@huge_advise}], [{@context={'context', 0x3d, 'user_u'}}]}) openat$incfs(r2, &(0x7f0000001700)='.log\x00', 0x388c0, 0x70) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4001) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r3, 0x5393, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 1: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0xc0189436, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5317, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 01:45:12 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"2e766ecc2476f2abefdd0081", &(0x7f0000000000)="1a", 0x20000, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) 01:45:12 executing program 3: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5322, &(0x7f0000000100)={"12766ecc2476f2abefdd0081", 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6893a960", 0x0, "486e34ae", 0x0, 0x0, 0x0, "97f452", "111624d28fb9a723035f383cd432c544d5eaf16ef4c2c06931661782930d0028f70d88ae9154b2a06618f5e13456"}, 0x2, 0x0, 0x0, 0x0}) [ 2849.219131] syz-executor.6[66505]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set [ 2862.655714] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88803895c080 (size 64): comm "syz-executor.0", pid 66182, jiffies 4297515367 (age 22.850s) hex dump (first 32 bytes): 00 c0 95 38 80 88 ff ff 2d 1c 00 00 5d 01 35 07 ...8....-...].5. 88 c8 95 38 80 88 ff ff 88 cf 95 38 80 88 ff ff ...8.......8.... backtrace: [<00000000d4ac5752>] __kmalloc_node+0x50/0x160 [<0000000009b36fa0>] kvmalloc_node+0xaa/0x200 [<000000001a819e5a>] iov_iter_extract_pages+0x353/0x1950 [<00000000bc50afee>] bio_map_user_iov+0x2f9/0xa80 [<000000004d692e64>] blk_rq_map_user_iov+0x685/0x1740 [<00000000ee0ea786>] blk_rq_map_user_io+0x1d1/0x200 [<000000002378a547>] sg_io+0x565/0xd80 [<00000000a6e8261b>] scsi_cdrom_send_packet+0x2aa/0x510 [<00000000b6e387d7>] scsi_ioctl+0x131/0x15a0 [<000000009ea216e9>] sr_block_ioctl+0x204/0x250 [<00000000184e0959>] blkdev_ioctl+0x2e4/0x750 [<00000000c73b0ddc>] __x64_sys_ioctl+0x1a4/0x210 [<0000000068d15508>] do_syscall_64+0x3f/0x90 [<000000003e032495>] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 BUG: leak checking failed VM DIAGNOSIS: 01:45:35 Registers: info registers vcpu 0 RAX=00000000006ef10b RBX=0000000000000000 RCX=ffffffff845a0fbe RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff81299855 RBP=dffffc0000000000 RSP=ffffffff85407e10 R8 =0000000000000001 R9 =ffffed100d9c6a08 R10=ffff88806ce35043 R11=0000000000000001 R12=ffffffff85d51c50 R13=1ffffffff0a80fc7 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff845a1f5e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc5a50c850 CR3=000000000ccec000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000416dbc2c00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000dcbd8d RBX=0000000000000001 RCX=ffffffff845a0fbe RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff81299855 RBP=dffffc0000000000 RSP=ffff888008de7e70 R8 =0000000000000001 R9 =ffffed100d9e6a08 R10=ffff88806cf35043 R11=0000000000000001 R12=ffffffff85d51c50 R13=1ffff110011bcfd3 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff845a1f5e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff7408eb010 CR3=0000000015b7e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29343620657a697328203038306335 XMM03=363620646970202c22302e726f747563 XMM04=2e2e2e2e382e2e2e2020373020353320 XMM05=32206666206666203838203038203833 XMM06=73657479622032332074737269662820 XMM07=2e323220656761282037363335313537 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000