0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:54 executing program 1: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 00:11:54 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x2}, 0xfe}, 0x18) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r0, 0x8004af79, &(0x7f0000000000)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:54 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000040)={0x8, 0x3ff, 0x20}) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xb}, 0x48) 00:11:54 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r2, 0x0, 0xffff8000a53affff) r3 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) renameat2(r5, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0xffff982b, 0x81, 0x7fff, 0x1050, 0xffffffffffffffff, 0x0, '\x00', r4, r6, 0x5, 0x2, 0x3}, 0x48) 00:11:54 executing program 2: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x4, 0x3, 0x45, 0x5, 0x40, @dev={0xfe, 0x80, '\x00', 0x36}, @private2, 0x10, 0x40, 0x200000, 0x2}}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x9, 0x4, 0x0, 0xc, 0xffffffffffffffff}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}], &(0x7f0000000040)='GPL\x00', 0x3, 0x95, &(0x7f0000000080)=""/149, 0x41100, 0x65, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x6, 0xffffffff, 0x23e8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0xffffffffffffffff, 0x1, r1], &(0x7f0000000380)=[{0x4, 0x2, 0xb, 0xe}]}, 0x90) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:54 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x2}, 0xfe}, 0x18) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r0, 0x8004af79, &(0x7f0000000000)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:54 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:54 executing program 1: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r2, 0x0, 0xffff8000a53affff) r3 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) (async) renameat2(r5, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x5) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0xffff982b, 0x81, 0x7fff, 0x1050, 0xffffffffffffffff, 0x0, '\x00', r4, r6, 0x5, 0x2, 0x3}, 0x48) 00:11:55 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000240)=0x60) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="780000001600000226bd7000fcdbdf250a7802c8", @ANYRES32=r3, @ANYBLOB="14000200ff0200000000000000000000000000011400ff002001000000000000000000000000000008000a0000000000080009004ca6b655a94d77256c630000000000f4ff0000000000000214000200fc0200000000000000000000000000010db14e0c5e7c699f8db6a8985e3cdc6f3468c07027759bc9320461edc8a40b5a72dc595ec8f00ce52ecdc9b867e75745871a846c0254"], 0x78}, 0x1, 0x0, 0x0, 0x20004844}, 0x814) r4 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000280), 0x2) ioctl$UDMABUF_CREATE(r4, 0x40187542, &(0x7f00000002c0)={r1, 0x1, 0xfffffffffffff000, 0xfffff000}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000300)=@rc={0x1f, @none}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000380)=""/88, 0x58}, {&(0x7f0000000400)=""/170, 0xaa}, {&(0x7f00000004c0)=""/138, 0x8a}, {&(0x7f0000000580)=""/186, 0xba}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000640)=""/234, 0xea}], 0x6, &(0x7f0000001880)=""/2, 0x2}, 0x40000040) 00:11:55 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x3, {0x2, 0xf0, 0x2}, 0xfe}, 0x18) (async, rerun: 32) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r0, 0x8004af79, &(0x7f0000000000)) (async, rerun: 32) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:55 executing program 1: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r2, 0x0, 0xffff8000a53affff) r3 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) renameat2(r5, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x5) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0xffff982b, 0x81, 0x7fff, 0x1050, 0xffffffffffffffff, 0x0, '\x00', r4, r6, 0x5, 0x2, 0x3}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r1, 0x0, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) (async) connect$can_j1939(r2, 0x0, 0xffff8000a53affff) (async) syz_open_dev$audion(0x0, 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r5, 0x0, 0x0) (async) renameat2(r5, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x5) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0xffff982b, 0x81, 0x7fff, 0x1050, 0xffffffffffffffff, 0x0, '\x00', r4, r6, 0x5, 0x2, 0x3}, 0x48) (async) 00:11:55 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 5: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x4}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x40814) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:11:55 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:55 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:11:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 1: socketpair(0xa, 0x3, 0x4, 0x0) [ 715.232486][T25313] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_rx_wq": -EINTR [ 715.319281][T25334] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 00:11:55 executing program 1: socketpair(0xa, 0x3, 0x4, 0x0) 00:11:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 5: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x4}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x40814) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x4}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) (async) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x40814) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) 00:11:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) (async) 00:11:55 executing program 1: socketpair(0xa, 0x3, 0x4, 0x0) 00:11:55 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:55 executing program 5: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x4}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x0, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x40814) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:11:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:11:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 5: getpid() openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 715.579501][T25382] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) [ 715.671498][T25413] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:55 executing program 5: getpid() openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:55 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100a54518000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 00:11:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 00:11:55 executing program 5: getpid() (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:11:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 00:11:55 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xda9, 0x2) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 715.879670][T25448] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:11:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:55 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 715.966991][T25471] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:55 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 00:11:55 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:55 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 00:11:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xda9, 0x2) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 716.140075][T25490] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:56 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) accept$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async, rerun: 32) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) (rerun: 32) 00:11:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:56 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 00:11:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0xda9, 0x2) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:56 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 716.280997][T25526] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 716.395387][T25544] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:11:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:11:56 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 00:11:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) 00:11:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:11:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 5: setxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x4, 0x2) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040), 0x3, 0x8000) ioctl$MEDIA_REQUEST_IOC_REINIT(0xffffffffffffffff, 0x7c81, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(r0, 0x7c80, 0x0) 00:11:56 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 00:11:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:11:56 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:11:56 executing program 4: socketpair(0xa, 0x3, 0x0, 0x0) 00:11:56 executing program 5: setxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x4, 0x2) (async, rerun: 32) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async, rerun: 32) r0 = syz_open_dev$audion(&(0x7f0000000040), 0x3, 0x8000) ioctl$MEDIA_REQUEST_IOC_REINIT(0xffffffffffffffff, 0x7c81, 0x0) (async) ioctl$MEDIA_REQUEST_IOC_QUEUE(r0, 0x7c80, 0x0) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:11:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) 00:11:56 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) 00:11:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 5: setxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x4, 0x2) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040), 0x3, 0x8000) ioctl$MEDIA_REQUEST_IOC_REINIT(0xffffffffffffffff, 0x7c81, 0x0) (async) ioctl$MEDIA_REQUEST_IOC_REINIT(0xffffffffffffffff, 0x7c81, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(r0, 0x7c80, 0x0) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffff000}) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="02000000", @ANYRES16=r1, @ANYBLOB="010025bd7000ffdbdf252151cf5c3dc7b69446200000080006006401010105000400050000020002000000050003006700"/62, @ANYRES16=r1, @ANYRES64=r0], 0x44}, 0x1, 0x0, 0x0, 0x88}, 0xc0080) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 4: socketpair(0x1d, 0x0, 0x0, &(0x7f00000000c0)) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="02000000", @ANYRES16=r1, @ANYBLOB="010025bd7000ffdbdf252151cf5c3dc7b69446200000080006006401010105000400050000020002000000050003006700"/62, @ANYRES16=r1, @ANYRES64=r0], 0x44}, 0x1, 0x0, 0x0, 0x88}, 0xc0080) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffff000}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffff000}) (async) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="02000000", @ANYRES16=r1, @ANYBLOB="010025bd7000ffdbdf252151cf5c3dc7b69446200000080006006401010105000400050000020002000000050003006700"/62, @ANYRES16=r1, @ANYRES64=r0], 0x44}, 0x1, 0x0, 0x0, 0x88}, 0xc0080) (async) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="02000000", @ANYRES16=r1, @ANYBLOB="010025bd7000ffdbdf252151cf5c3dc7b69446200000080006006401010105000400050000020002000000050003006700"/62, @ANYRES16=r1, @ANYRES64=r0], 0x44}, 0x1, 0x0, 0x0, 0x88}, 0xc0080) [ 717.482966][T25786] can: request_module (can-proto-0) failed. 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 00:11:57 executing program 4: socketpair(0x1d, 0x0, 0x0, &(0x7f00000000c0)) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffff000}) [ 717.570282][T25812] can: request_module (can-proto-0) failed. 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 4: socketpair(0x1d, 0x0, 0x0, &(0x7f00000000c0)) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) geteuid() r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r3, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 717.697020][T25838] can: request_module (can-proto-0) failed. 00:11:57 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x240, &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:57 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r3, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 00:11:57 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x240, &(0x7f0000000080)) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:11:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:57 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x240, &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x240, &(0x7f0000000080)) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:11:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:57 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x93b}, 0x4) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 4: socketpair(0x1d, 0x0, 0x0, 0x0) 00:11:58 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x1) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x93b}, 0x4) 00:11:58 executing program 4: socketpair(0x1d, 0x0, 0x0, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x93b}, 0x4) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x1) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:58 executing program 4: socketpair(0x1d, 0x0, 0x0, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 3: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x1) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 3: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="5ebb6d4ceb37fadd0b78b309d1f6ddb6efa74fa9bc5c393cd5e9dd6a8d7a003a3cf5373068", 0x25, 0x4000, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x6, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 3: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x6, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="5ebb6d4ceb37fadd0b78b309d1f6ddb6efa74fa9bc5c393cd5e9dd6a8d7a003a3cf5373068", 0x25, 0x4000, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x6, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 3: prctl$PR_GET_KEEPCAPS(0x7) socket$bt_rfcomm(0x1f, 0x3, 0x3) 00:11:58 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="5ebb6d4ceb37fadd0b78b309d1f6ddb6efa74fa9bc5c393cd5e9dd6a8d7a003a3cf5373068", 0x25, 0x4000, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x0) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8}, 0x90) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 3: prctl$PR_GET_KEEPCAPS(0x7) socket$bt_rfcomm(0x1f, 0x3, 0x3) prctl$PR_GET_KEEPCAPS(0x7) (async) socket$bt_rfcomm(0x1f, 0x3, 0x3) (async) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8}, 0x90) 00:11:58 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00') openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x3ff, 0xfffff001, 0x8, 0x3, 0x1, 0x903f, 0x1}) 00:11:58 executing program 3: prctl$PR_GET_KEEPCAPS(0x7) socket$bt_rfcomm(0x1f, 0x3, 0x3) prctl$PR_GET_KEEPCAPS(0x7) (async) socket$bt_rfcomm(0x1f, 0x3, 0x3) (async) 00:11:58 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x240, &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:11:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 3: sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040155}, 0x80800) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x0) 00:11:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x3ff, 0xfffff001, 0x8, 0x3, 0x1, 0x903f, 0x1}) 00:11:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000040)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:58 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:58 executing program 3: sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040155}, 0x80800) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x3ff, 0xfffff001, 0x8, 0x3, 0x1, 0x903f, 0x1}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x3ff, 0xfffff001, 0x8, 0x3, 0x1, 0x903f, 0x1}) (async) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x38, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 3: sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040155}, 0x80800) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040155}, 0x80800) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:11:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x38, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 719.179211][T26162] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:11:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'virt_wifi0\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c, 0x887, 0x0, 0x40, 0xff, 0x20, 0xf2, 0x3, 0x3, 0x7f, [0x3, 0x8, 0x5, 0x9, 0x80000001, 0x40, 0x80, 0xfffffff8], [0x3ff, 0x9, 0x1ff, 0x36d]}}) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 719.212576][T26159] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:11:59 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) inotify_init1(0x80800) 00:11:59 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x38, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_DEL_DEV(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r2, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x4) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="022028bd7000ffdbdf2524c0505d3c25d9315070616e310000000a0001007770616e340000000a2df2007770616eea0000000a0001007770616e30000000000000000006616e3300000072ce9b4ff643c129cc7da7cbbff92bfa144a3035b7355ca9317537192aa8033d624cd94273f57cdfa199fad55466d763"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x54) 00:11:59 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r5 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x2, '\x00', 0x0, r3, 0x400, 0x0, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r6}, &(0x7f0000000440), &(0x7f0000000480)=r4}, 0x20) getsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) 00:11:59 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) inotify_init1(0x80800) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$can_j1939(0x1d, 0x2, 0x7) (async) inotify_init1(0x80800) (async) 00:11:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x3c, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'virt_wifi0\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c, 0x887, 0x0, 0x40, 0xff, 0x20, 0xf2, 0x3, 0x3, 0x7f, [0x3, 0x8, 0x5, 0x9, 0x80000001, 0x40, 0x80, 0xfffffff8], [0x3ff, 0x9, 0x1ff, 0x36d]}}) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r5 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x2, '\x00', 0x0, r3, 0x400, 0x0, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r6}, &(0x7f0000000440), &(0x7f0000000480)=r4}, 0x20) getsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x3c, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) inotify_init1(0x80800) (async) inotify_init1(0x80800) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r5 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x2, '\x00', 0x0, r3, 0x400, 0x0, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r6}, &(0x7f0000000440), &(0x7f0000000480)=r4}, 0x20) getsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) 00:11:59 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x7400000000000000) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1}, 0x48) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'virt_wifi0\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c, 0x887, 0x0, 0x40, 0xff, 0x20, 0xf2, 0x3, 0x3, 0x7f, [0x3, 0x8, 0x5, 0x9, 0x80000001, 0x40, 0x80, 0xfffffff8], [0x3ff, 0x9, 0x1ff, 0x36d]}}) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x9, 0x3f, 0x2, 0x880}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x6, 0x4) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x0, 0x3, {0x0, 0xff}, 0x2}, 0x18) 00:11:59 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) socket$bt_rfcomm(0x1f, 0x1, 0x3) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x2, '\x00', 0x0, r3, 0x400, 0x0, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r5}, &(0x7f0000000440), &(0x7f0000000480)=r4}, 0x20) 00:11:59 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x9, 0x3f, 0x2, 0x880}) (async) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x6, 0x4) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x0, 0x3, {0x0, 0xff}, 0x2}, 0x18) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x80000001, 0x404080) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {r3, 0x0, 0x1000000000000, 0x2000}, {r4, 0x0, 0x4000, 0x4000}]}) 00:11:59 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x9, 0x3f, 0x2, 0x880}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x6, 0x4) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x0, 0x3, {0x0, 0xff}, 0x2}, 0x18) 00:11:59 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fanotify_mark(0xffffffffffffffff, 0x200, 0x32, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$unix(r3, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000040)=0xd, 0x4) 00:11:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x80000001, 0x404080) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {r3, 0x0, 0x1000000000000, 0x2000}, {r4, 0x0, 0x4000, 0x4000}]}) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) socket$bt_rfcomm(0x1f, 0x1, 0x3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x2, '\x00', 0x0, r3, 0x400, 0x0, 0x2}, 0x48) 00:11:59 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0xa8c43) sendmsg$unix(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000140)=""/235, 0xeb}], 0x5, &(0x7f00000002c0)=""/74, 0x4a}, 0x40002000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:11:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:11:59 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0xa8c43) sendmsg$unix(r0, 0x0, 0x0) (async) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000140)=""/235, 0xeb}], 0x5, &(0x7f00000002c0)=""/74, 0x4a}, 0x40002000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:11:59 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) socket$bt_rfcomm(0x1f, 0x1, 0x3) 00:11:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x80000001, 0x404080) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {r3, 0x0, 0x1000000000000, 0x2000}, {r4, 0x0, 0x4000, 0x4000}]}) 00:11:59 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0xa8c43) sendmsg$unix(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000140)=""/235, 0xeb}], 0x5, &(0x7f00000002c0)=""/74, 0x4a}, 0x40002000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0xa8c43) (async) sendmsg$unix(r0, 0x0, 0x0) (async) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000140)=""/235, 0xeb}], 0x5, &(0x7f00000002c0)=""/74, 0x4a}, 0x40002000) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:12:00 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) fanotify_mark(0xffffffffffffffff, 0x200, 0x32, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) (async) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) sendmsg$unix(r3, 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000040)=0xd, 0x4) 00:12:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:00 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) 00:12:00 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) getpgid(r0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00011ac3040b00b987fdfbe2803e65006130000000c3800000005bd5ed38cd832682332e77a2b97b97c4f1043633cc0d44fe00e9e5d73730d89cf2eddf05b94eabc7d8f8de415f0e77adae29de3962edf681294eff2709dc510870b985f351b2c639427f59b2d2f0b7f77dd961089a2ac4dcce45d76bb5f53b9c35a5fa8f7cc6d58c075ad4adb37814c58a000200008c7b1d4118532c0ec10859cfae2ad3744d73565e5c2200"/176]) 00:12:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x80000001, 0x404080) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {r3, 0x0, 0x1000000000000, 0x2000}, {r4, 0x0, 0x4000, 0x4000}]}) 00:12:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x0, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:00 executing program 0: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x80000001, 0x404080) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {r3, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:00 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fanotify_mark(0xffffffffffffffff, 0x200, 0x32, 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$unix(r3, 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000040)=0xd, 0x4) 00:12:00 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) getpgid(r0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00011ac3040b00b987fdfbe2803e65006130000000c3800000005bd5ed38cd832682332e77a2b97b97c4f1043633cc0d44fe00e9e5d73730d89cf2eddf05b94eabc7d8f8de415f0e77adae29de3962edf681294eff2709dc510870b985f351b2c639427f59b2d2f0b7f77dd961089a2ac4dcce45d76bb5f53b9c35a5fa8f7cc6d58c075ad4adb37814c58a000200008c7b1d4118532c0ec10859cfae2ad3744d73565e5c2200"/176]) (rerun: 64) 00:12:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:00 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) 00:12:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:00 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="0169000000000000002f61cb", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)=@generic, 0x80, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/3, 0x3}, {&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/227, 0xe3}, {&(0x7f0000000380)=""/17, 0x11}], 0x5, &(0x7f00000015c0)=""/239, 0xef}, 0x2000) statx(0xffffffffffffff9c, &(0x7f00000016c0)='./file0\x00', 0x2000, 0x0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x288810, &(0x7f0000001800)={'trans=unix,', {[{@posixacl}, {@access_client}, {@msize={'msize', 0x3d, 0x10000}}, {@privport}, {@noextend}], [{@smackfsroot={'smackfsroot', 0x3d, '\'*-{,&-'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/virtual_nci\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:00 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) 00:12:00 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) getpgid(r0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00011ac3040b00b987fdfbe2803e65006130000000c3800000005bd5ed38cd832682332e77a2b97b97c4f1043633cc0d44fe00e9e5d73730d89cf2eddf05b94eabc7d8f8de415f0e77adae29de3962edf681294eff2709dc510870b985f351b2c639427f59b2d2f0b7f77dd961089a2ac4dcce45d76bb5f53b9c35a5fa8f7cc6d58c075ad4adb37814c58a000200008c7b1d4118532c0ec10859cfae2ad3744d73565e5c2200"/176]) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="0169000000000000002f61cb", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)=@generic, 0x80, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/3, 0x3}, {&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/227, 0xe3}, {&(0x7f0000000380)=""/17, 0x11}], 0x5, &(0x7f00000015c0)=""/239, 0xef}, 0x2000) (async) statx(0xffffffffffffff9c, &(0x7f00000016c0)='./file0\x00', 0x2000, 0x0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x288810, &(0x7f0000001800)={'trans=unix,', {[{@posixacl}, {@access_client}, {@msize={'msize', 0x3d, 0x10000}}, {@privport}, {@noextend}], [{@smackfsroot={'smackfsroot', 0x3d, '\'*-{,&-'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/virtual_nci\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) (async, rerun: 32) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) (rerun: 32) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:01 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB="0169000000000000002f61cb", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)=@generic, 0x80, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/3, 0x3}, {&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/227, 0xe3}, {&(0x7f0000000380)=""/17, 0x11}], 0x5, &(0x7f00000015c0)=""/239, 0xef}, 0x2000) (async) statx(0xffffffffffffff9c, &(0x7f00000016c0)='./file0\x00', 0x2000, 0x0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x288810, &(0x7f0000001800)={'trans=unix,', {[{@posixacl}, {@access_client}, {@msize={'msize', 0x3d, 0x10000}}, {@privport}, {@noextend}], [{@smackfsroot={'smackfsroot', 0x3d, '\'*-{,&-'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/virtual_nci\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 3: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) (async) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:01 executing program 5: socketpair(0x11, 0x4, 0xfff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@qipcrtr={0x2a, 0x2, 0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="d2e174a15fc6a822221ad63555af049d5bf8c1ffa4a97b236e751cd7536bbc8eb71f5e49dfbe29ca9f16f4934c4b9578e047f1cd910c55b65ae6bb9bbc72233b81fa12eca93a013c06a4a70ae6a68bd11c90b585103b277d532a880af170ff81e41c1e6e09553252e6eade67ae1aed8cd043ade684135ea7d31973436a0556f5446f17fa340641d7b0e0ee3947b44a794604ca734c8a8abbbd3ebb4ad42afde469785bd3094dfe8a8ac7e68044de49a60632f2c4b8746515b45a24e98cf0a54ee6bc3fe87828619c83e193a41d0e9e3606b73eb860b59ed281aaa1a5d9739721f53e", 0xe2}, {&(0x7f00000001c0)="a6583e458102f1095923149c08d55101dbc4ef6073fd7bd306ba00aaea07b86fe5eb81", 0x23}], 0x2}, 0x24000800) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000280)=@rc={0x1f, @none, 0xad}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)="0bf90972fea3896e43e58336cd954e824ed2768ab13886c77a9aa0edde656d93c32960c22f4c84c2df40a02a4f9c12ff39030dcbbc2da21de09482040331c4dce1790987e32446f419bf5a49d7863588e6eb1f6a4f8bcf1b3c6f87ef1bdececfe424f492d2493126cb452fb258d8e25e54a2765cf9d84313ccfb2a6751617370890daa4aea664d3ff1efa92849942efad93707d03f18ab6a8ee9e1a3be1e65e5b47f2f6f1baeb0aa0b6b00826f8563bf7100e77517b2dcc9371933267b7090e8279a8170ce211ae4841ae7c52bace73e401d7e893189690c92147edaf7e5cfc54b852f082aacf25af694c831", 0xec}, {&(0x7f0000000440)="d0bfa03c9f03eacba93a672ad1125f1f3fc328831a965c6d17eecd7671d9f4752b4cdc6470feff9d90291afa00b9d40b1ed20981aef7930b", 0x38}, {&(0x7f0000000480)="f9669500878769f87f0fc6cda87d83dee44aa6720b871c105778884b", 0x1c}, {&(0x7f00000004c0)="2973412eced0dad074c5551d5b058ee6e750679e8de11c4482a8918e8a0cca2d2818c1f158e47276ef0b9a1da466c2db51556bdad52c0ce75e93e65c7abd60323b057f9aa3475d4ff0bcc538763691ecd773bd87f168486e1ca20c26355d1a81881ee8e595ce45d4edc6e4b994f5b4757eb78a0d2a42a27abbd511", 0x7b}, {&(0x7f0000000540)="55250b22802406fb58cfa8df60b975274dd649d35b2a406141632aaa", 0x1c}], 0x5, &(0x7f0000000600)}, 0x841) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x90) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x90) 00:12:01 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) (async) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 5: socketpair(0x11, 0x4, 0xfff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@qipcrtr={0x2a, 0x2, 0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="d2e174a15fc6a822221ad63555af049d5bf8c1ffa4a97b236e751cd7536bbc8eb71f5e49dfbe29ca9f16f4934c4b9578e047f1cd910c55b65ae6bb9bbc72233b81fa12eca93a013c06a4a70ae6a68bd11c90b585103b277d532a880af170ff81e41c1e6e09553252e6eade67ae1aed8cd043ade684135ea7d31973436a0556f5446f17fa340641d7b0e0ee3947b44a794604ca734c8a8abbbd3ebb4ad42afde469785bd3094dfe8a8ac7e68044de49a60632f2c4b8746515b45a24e98cf0a54ee6bc3fe87828619c83e193a41d0e9e3606b73eb860b59ed281aaa1a5d9739721f53e", 0xe2}, {&(0x7f00000001c0)="a6583e458102f1095923149c08d55101dbc4ef6073fd7bd306ba00aaea07b86fe5eb81", 0x23}], 0x2}, 0x24000800) (async, rerun: 32) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async, rerun: 32) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000280)=@rc={0x1f, @none, 0xad}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)="0bf90972fea3896e43e58336cd954e824ed2768ab13886c77a9aa0edde656d93c32960c22f4c84c2df40a02a4f9c12ff39030dcbbc2da21de09482040331c4dce1790987e32446f419bf5a49d7863588e6eb1f6a4f8bcf1b3c6f87ef1bdececfe424f492d2493126cb452fb258d8e25e54a2765cf9d84313ccfb2a6751617370890daa4aea664d3ff1efa92849942efad93707d03f18ab6a8ee9e1a3be1e65e5b47f2f6f1baeb0aa0b6b00826f8563bf7100e77517b2dcc9371933267b7090e8279a8170ce211ae4841ae7c52bace73e401d7e893189690c92147edaf7e5cfc54b852f082aacf25af694c831", 0xec}, {&(0x7f0000000440)="d0bfa03c9f03eacba93a672ad1125f1f3fc328831a965c6d17eecd7671d9f4752b4cdc6470feff9d90291afa00b9d40b1ed20981aef7930b", 0x38}, {&(0x7f0000000480)="f9669500878769f87f0fc6cda87d83dee44aa6720b871c105778884b", 0x1c}, {&(0x7f00000004c0)="2973412eced0dad074c5551d5b058ee6e750679e8de11c4482a8918e8a0cca2d2818c1f158e47276ef0b9a1da466c2db51556bdad52c0ce75e93e65c7abd60323b057f9aa3475d4ff0bcc538763691ecd773bd87f168486e1ca20c26355d1a81881ee8e595ce45d4edc6e4b994f5b4757eb78a0d2a42a27abbd511", 0x7b}, {&(0x7f0000000540)="55250b22802406fb58cfa8df60b975274dd649d35b2a406141632aaa", 0x1c}], 0x5, &(0x7f0000000600)}, 0x841) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x90) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:12:01 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x8e, 0x2, 0x3, "844d27fbac1a5dff00", "86e7ca75c42afae41648c51678dadd52bdba5f6ebf1736ecbb49a2cfd80961a41e3133bad7b002ecf9b9ba2a0377841489e0aef0607ce7bf014d15f1f7709ab0eee66087a279aa4031dd0b01bd709d00a25d36d5103644ccaee3d6e1663f724d0eaa9fb4d7fb87e4e0dda5312774d9c4ed50488975ec4b9557"}, 0x8e, 0x1) getpeername(r0, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x800000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@measure}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@pcr={'pcr', 0x3d, 0x12}}]}}) 00:12:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:12:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x2c}}, 0x0) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}], 0x10, 0x80000001}, 0x90) 00:12:01 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}], 0x10, 0x80000001}, 0x90) 00:12:01 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:02 executing program 5: socketpair(0x11, 0x4, 0xfff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@qipcrtr={0x2a, 0x2, 0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="d2e174a15fc6a822221ad63555af049d5bf8c1ffa4a97b236e751cd7536bbc8eb71f5e49dfbe29ca9f16f4934c4b9578e047f1cd910c55b65ae6bb9bbc72233b81fa12eca93a013c06a4a70ae6a68bd11c90b585103b277d532a880af170ff81e41c1e6e09553252e6eade67ae1aed8cd043ade684135ea7d31973436a0556f5446f17fa340641d7b0e0ee3947b44a794604ca734c8a8abbbd3ebb4ad42afde469785bd3094dfe8a8ac7e68044de49a60632f2c4b8746515b45a24e98cf0a54ee6bc3fe87828619c83e193a41d0e9e3606b73eb860b59ed281aaa1a5d9739721f53e", 0xe2}, {&(0x7f00000001c0)="a6583e458102f1095923149c08d55101dbc4ef6073fd7bd306ba00aaea07b86fe5eb81", 0x23}], 0x2}, 0x24000800) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000280)=@rc={0x1f, @none, 0xad}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)="0bf90972fea3896e43e58336cd954e824ed2768ab13886c77a9aa0edde656d93c32960c22f4c84c2df40a02a4f9c12ff39030dcbbc2da21de09482040331c4dce1790987e32446f419bf5a49d7863588e6eb1f6a4f8bcf1b3c6f87ef1bdececfe424f492d2493126cb452fb258d8e25e54a2765cf9d84313ccfb2a6751617370890daa4aea664d3ff1efa92849942efad93707d03f18ab6a8ee9e1a3be1e65e5b47f2f6f1baeb0aa0b6b00826f8563bf7100e77517b2dcc9371933267b7090e8279a8170ce211ae4841ae7c52bace73e401d7e893189690c92147edaf7e5cfc54b852f082aacf25af694c831", 0xec}, {&(0x7f0000000440)="d0bfa03c9f03eacba93a672ad1125f1f3fc328831a965c6d17eecd7671d9f4752b4cdc6470feff9d90291afa00b9d40b1ed20981aef7930b", 0x38}, {&(0x7f0000000480)="f9669500878769f87f0fc6cda87d83dee44aa6720b871c105778884b", 0x1c}, {&(0x7f00000004c0)="2973412eced0dad074c5551d5b058ee6e750679e8de11c4482a8918e8a0cca2d2818c1f158e47276ef0b9a1da466c2db51556bdad52c0ce75e93e65c7abd60323b057f9aa3475d4ff0bcc538763691ecd773bd87f168486e1ca20c26355d1a81881ee8e595ce45d4edc6e4b994f5b4757eb78a0d2a42a27abbd511", 0x7b}, {&(0x7f0000000540)="55250b22802406fb58cfa8df60b975274dd649d35b2a406141632aaa", 0x1c}], 0x5, &(0x7f0000000600)}, 0x841) 00:12:02 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x8e, 0x2, 0x3, "844d27fbac1a5dff00", "86e7ca75c42afae41648c51678dadd52bdba5f6ebf1736ecbb49a2cfd80961a41e3133bad7b002ecf9b9ba2a0377841489e0aef0607ce7bf014d15f1f7709ab0eee66087a279aa4031dd0b01bd709d00a25d36d5103644ccaee3d6e1663f724d0eaa9fb4d7fb87e4e0dda5312774d9c4ed50488975ec4b9557"}, 0x8e, 0x1) getpeername(r0, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) (async) getpeername(r0, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async) sendmsg$unix(r1, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x800000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@measure}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@pcr={'pcr', 0x3d, 0x12}}]}}) 00:12:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x0, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x8e, 0x2, 0x3, "844d27fbac1a5dff00", "86e7ca75c42afae41648c51678dadd52bdba5f6ebf1736ecbb49a2cfd80961a41e3133bad7b002ecf9b9ba2a0377841489e0aef0607ce7bf014d15f1f7709ab0eee66087a279aa4031dd0b01bd709d00a25d36d5103644ccaee3d6e1663f724d0eaa9fb4d7fb87e4e0dda5312774d9c4ed50488975ec4b9557"}, 0x8e, 0x1) getpeername(r0, &(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x80) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x800000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@measure}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@pcr={'pcr', 0x3d, 0x12}}]}}) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x0, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 0: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:02 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x0, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 3: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0]}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000140)={0x0, 0x0, 0x0}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x100, '\x00', r2, r3, 0x3, 0x4, 0x2}, 0x48) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000002c0)={0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1, r4}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) r6 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r6, 0x0, 0x0) fanotify_mark(r6, 0x20, 0x10, r5, &(0x7f0000000500)='./file0\x00') ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0, 0x0}) ioctl$DRM_IOCTL_MODE_GETPLANE(r5, 0xc02064b6, &(0x7f0000000280)={0x0, r0, r7, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) socket$kcm(0x29, 0x6, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) (async) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x0, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x0, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x0, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 3: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0]}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000140)={0x0, 0x0, 0x0}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x100, '\x00', r2, r3, 0x3, 0x4, 0x2}, 0x48) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000002c0)={0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1, r4}) (async) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) (async) r6 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r6, 0x0, 0x0) (async) fanotify_mark(r6, 0x20, 0x10, r5, &(0x7f0000000500)='./file0\x00') ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0, 0x0}) ioctl$DRM_IOCTL_MODE_GETPLANE(r5, 0xc02064b6, &(0x7f0000000280)={0x0, r0, r7, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x0, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x0, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x0, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) socket$kcm(0x29, 0x6, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) (async) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 3: ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0]}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000140)={0x0, 0x0, 0x0}) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000440)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x100, '\x00', r2, r3, 0x3, 0x4, 0x2}, 0x48) (async) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f00000002c0)={0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0], 0x1, r4}) (async) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) (async) r6 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r6, 0x0, 0x0) fanotify_mark(r6, 0x20, 0x10, r5, &(0x7f0000000500)='./file0\x00') (async) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0, 0x0}) ioctl$DRM_IOCTL_MODE_GETPLANE(r5, 0xc02064b6, &(0x7f0000000280)={0x0, r0, r7, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0]}) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 3: memfd_create(&(0x7f0000000000)='/dev/virtual_nci\x00', 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 1: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x200, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:02 executing program 1: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x5, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:02 executing program 1: ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 3: memfd_create(&(0x7f0000000000)='/dev/virtual_nci\x00', 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) memfd_create(&(0x7f0000000000)='/dev/virtual_nci\x00', 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x4, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}]}) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x3, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000}]}) 00:12:02 executing program 3: memfd_create(&(0x7f0000000000)='/dev/virtual_nci\x00', 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x0, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x0, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="21a826816df8167097c1ca0c6974ca1da5991f0c0c232315ba682a2967b8aefea1ad55d6b7b45b749645c0a734d37be8aa92de0fbef627545c43d08700710cae7b5de97ee4bbca5f072fbebb94329a6833f7ad6dc68fdde39ab1bbf3d0ffcdd4912fe336a357310921dea22845d7885341"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x768, 0x148, 0x148, 0xffffffff, 0x148, 0x5a8, 0x698, 0x698, 0xffffffff, 0x698, 0x698, 0x5, &(0x7f0000000040), {[{{@ipv6={@mcast2, @private0, [0xff000000, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'tunl0\x00', '\x00', {}, {}, 0x0, 0x64, 0x3, 0x10}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x1, 0x4d], 0xed7, 0x0, 0x3}}, @common=@eui64={{0x28}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @port=0x4e22, @port=0x4e21}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private2, [0xff, 0xffffffff, 0xff, 0xffffffff], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth0_virt_wifi\x00', 'macvlan1\x00', {}, {}, 0x6c, 0xef, 0x4}, 0x0, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x1d, [{0xffff, 0x1f, 0x4}, {0x6, 0x4, 0xff, 0x9}, {0x8, 0x20, 0x1, 0x3}, {0x6, 0x4, 0xa0}, {0x200, 0x8, 0x5, 0x80000000}, {0x2, 0x1f, 0x0, 0xffffffff}, {0xfffb, 0x9, 0x80, 0x7fffffff}, {0x5, 0x4, 0x1, 0xc6c}, {0x101, 0xc1, 0x8, 0x4}, {0xd80, 0x8e, 0x4, 0xffff}, {0x0, 0x4, 0x7, 0xfffffff8}, {0x7a, 0x1, 0x90, 0x53e}, {0x9fb4, 0x46, 0xea, 0x3}, {0x100, 0x40, 0x20, 0x80000001}, {0x5, 0x0, 0x4, 0x934}, {0x3, 0xff, 0xc2, 0x10001}, {0xff, 0x4, 0x3, 0xffff4555}, {0x83e, 0x6, 0x34, 0xa16}, {0x1, 0x20, 0x2, 0x4}, {0x85, 0x0, 0x6, 0x1ff}, {0x4, 0x80, 0x8, 0x207}, {0x8000, 0xd6, 0x4, 0x9}, {0x0, 0x0, 0x0, 0x6}, {0x7, 0x1f, 0x1f, 0x40}, {0x100, 0x9, 0x0, 0x6}, {0x0, 0x0, 0x8, 0x81}, {0x3, 0xab, 0x5, 0xf1}, {0x3, 0x0, 0x1, 0x2}, {0x4, 0x7f, 0xff, 0x400}, {0x2aba, 0x7, 0x4, 0x8}, {0x200, 0x7, 0x9, 0x4}, {0x6, 0x0, 0x37, 0x1ff}, {0xf804, 0x25, 0x1, 0x7}, {0x470, 0x20, 0x7, 0x6}, {0x81, 0x80, 0x23}, {0x6548, 0xff, 0x8, 0x3}, {0x7ff, 0xf5, 0x87, 0x1}, {0x6, 0xff, 0x0, 0x6}, {0x8, 0x66, 0x0, 0x6}, {0x1000, 0x0, 0xc8, 0x80000001}, {0x85, 0x7, 0x7, 0x4}, {0x5, 0x84, 0x1e, 0x7fffffff}, {0x8, 0x21, 0x5, 0x5}, {0x0, 0x1f, 0x3, 0x80000001}, {0x9, 0x36, 0x40, 0x5}, {0x200, 0x5, 0x7, 0x28b}, {0xdd1, 0x20, 0x3f, 0x10001}, {0x9, 0x7, 0x2, 0x72}, {0x8, 0x3, 0x40}, {0x95e, 0x1, 0xff, 0x4}, {0xfffe, 0xc1, 0x1, 0xe57f}, {0x5db, 0x2, 0xff, 0x4}, {0x100, 0x5, 0x40}, {0x847f, 0xc3, 0x5, 0x5}, {0x7fff, 0x1, 0x40}, {0x1, 0xff, 0x3f, 0x3}, {0x400, 0x0, 0x5}, {0x7, 0x9, 0x4, 0x1}, {0x800, 0xb0, 0x4, 0x40}, {0xe126, 0x8, 0x81, 0xe860}, {0x100, 0x20, 0xf, 0x401}, {0x8, 0x2, 0x3, 0x4}, {0x3, 0xd8, 0x0, 0x6542}, {0x243f, 0x6, 0x80, 0xc4e}], {0xfff}}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@local, @ipv4=@remote, @gre_key=0x8, @port=0x4e22}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @mcast1, [0xffffffff, 0xff000000, 0x0, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'macvlan1\x00', 'nicvf0\x00', {0xedb4b7abf038b0f3}, {0xff}, 0x0, 0x1a, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x2, 0xc1}}, @common=@mh={{0x28}, {"afef"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}, @port=0x4e20, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@private2, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}, @gre_key=0xdbf, @icmp_id=0x65}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}]}) 00:12:02 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)=r0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080), 0x2) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x0, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:02 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}]}) 00:12:02 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="21a826816df8167097c1ca0c6974ca1da5991f0c0c232315ba682a2967b8aefea1ad55d6b7b45b749645c0a734d37be8aa92de0fbef627545c43d08700710cae7b5de97ee4bbca5f072fbebb94329a6833f7ad6dc68fdde39ab1bbf3d0ffcdd4912fe336a357310921dea22845d7885341"]) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="21a826816df8167097c1ca0c6974ca1da5991f0c0c232315ba682a2967b8aefea1ad55d6b7b45b749645c0a734d37be8aa92de0fbef627545c43d08700710cae7b5de97ee4bbca5f072fbebb94329a6833f7ad6dc68fdde39ab1bbf3d0ffcdd4912fe336a357310921dea22845d7885341"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x768, 0x148, 0x148, 0xffffffff, 0x148, 0x5a8, 0x698, 0x698, 0xffffffff, 0x698, 0x698, 0x5, &(0x7f0000000040), {[{{@ipv6={@mcast2, @private0, [0xff000000, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'tunl0\x00', '\x00', {}, {}, 0x0, 0x64, 0x3, 0x10}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x1, 0x4d], 0xed7, 0x0, 0x3}}, @common=@eui64={{0x28}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @port=0x4e22, @port=0x4e21}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private2, [0xff, 0xffffffff, 0xff, 0xffffffff], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth0_virt_wifi\x00', 'macvlan1\x00', {}, {}, 0x6c, 0xef, 0x4}, 0x0, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x1d, [{0xffff, 0x1f, 0x4}, {0x6, 0x4, 0xff, 0x9}, {0x8, 0x20, 0x1, 0x3}, {0x6, 0x4, 0xa0}, {0x200, 0x8, 0x5, 0x80000000}, {0x2, 0x1f, 0x0, 0xffffffff}, {0xfffb, 0x9, 0x80, 0x7fffffff}, {0x5, 0x4, 0x1, 0xc6c}, {0x101, 0xc1, 0x8, 0x4}, {0xd80, 0x8e, 0x4, 0xffff}, {0x0, 0x4, 0x7, 0xfffffff8}, {0x7a, 0x1, 0x90, 0x53e}, {0x9fb4, 0x46, 0xea, 0x3}, {0x100, 0x40, 0x20, 0x80000001}, {0x5, 0x0, 0x4, 0x934}, {0x3, 0xff, 0xc2, 0x10001}, {0xff, 0x4, 0x3, 0xffff4555}, {0x83e, 0x6, 0x34, 0xa16}, {0x1, 0x20, 0x2, 0x4}, {0x85, 0x0, 0x6, 0x1ff}, {0x4, 0x80, 0x8, 0x207}, {0x8000, 0xd6, 0x4, 0x9}, {0x0, 0x0, 0x0, 0x6}, {0x7, 0x1f, 0x1f, 0x40}, {0x100, 0x9, 0x0, 0x6}, {0x0, 0x0, 0x8, 0x81}, {0x3, 0xab, 0x5, 0xf1}, {0x3, 0x0, 0x1, 0x2}, {0x4, 0x7f, 0xff, 0x400}, {0x2aba, 0x7, 0x4, 0x8}, {0x200, 0x7, 0x9, 0x4}, {0x6, 0x0, 0x37, 0x1ff}, {0xf804, 0x25, 0x1, 0x7}, {0x470, 0x20, 0x7, 0x6}, {0x81, 0x80, 0x23}, {0x6548, 0xff, 0x8, 0x3}, {0x7ff, 0xf5, 0x87, 0x1}, {0x6, 0xff, 0x0, 0x6}, {0x8, 0x66, 0x0, 0x6}, {0x1000, 0x0, 0xc8, 0x80000001}, {0x85, 0x7, 0x7, 0x4}, {0x5, 0x84, 0x1e, 0x7fffffff}, {0x8, 0x21, 0x5, 0x5}, {0x0, 0x1f, 0x3, 0x80000001}, {0x9, 0x36, 0x40, 0x5}, {0x200, 0x5, 0x7, 0x28b}, {0xdd1, 0x20, 0x3f, 0x10001}, {0x9, 0x7, 0x2, 0x72}, {0x8, 0x3, 0x40}, {0x95e, 0x1, 0xff, 0x4}, {0xfffe, 0xc1, 0x1, 0xe57f}, {0x5db, 0x2, 0xff, 0x4}, {0x100, 0x5, 0x40}, {0x847f, 0xc3, 0x5, 0x5}, {0x7fff, 0x1, 0x40}, {0x1, 0xff, 0x3f, 0x3}, {0x400, 0x0, 0x5}, {0x7, 0x9, 0x4, 0x1}, {0x800, 0xb0, 0x4, 0x40}, {0xe126, 0x8, 0x81, 0xe860}, {0x100, 0x20, 0xf, 0x401}, {0x8, 0x2, 0x3, 0x4}, {0x3, 0xd8, 0x0, 0x6542}, {0x243f, 0x6, 0x80, 0xc4e}], {0xfff}}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@local, @ipv4=@remote, @gre_key=0x8, @port=0x4e22}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @mcast1, [0xffffffff, 0xff000000, 0x0, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'macvlan1\x00', 'nicvf0\x00', {0xedb4b7abf038b0f3}, {0xff}, 0x0, 0x1a, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x2, 0xc1}}, @common=@mh={{0x28}, {"afef"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}, @port=0x4e20, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@private2, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}, @gre_key=0xdbf, @icmp_id=0x65}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) 00:12:02 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:02 executing program 1: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0x0, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)=r0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080), 0x2) 00:12:03 executing program 1: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}]}) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0x0, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)=r0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080), 0x2) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x3, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {}]}) 00:12:03 executing program 1: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32, @ANYBLOB="0000000000000100000000000010000000000000"]) 00:12:03 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="21a826816df8167097c1ca0c6974ca1da5991f0c0c232315ba682a2967b8aefea1ad55d6b7b45b749645c0a734d37be8aa92de0fbef627545c43d08700710cae7b5de97ee4bbca5f072fbebb94329a6833f7ad6dc68fdde39ab1bbf3d0ffcdd4912fe336a357310921dea22845d7885341"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x768, 0x148, 0x148, 0xffffffff, 0x148, 0x5a8, 0x698, 0x698, 0xffffffff, 0x698, 0x698, 0x5, &(0x7f0000000040), {[{{@ipv6={@mcast2, @private0, [0xff000000, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'tunl0\x00', '\x00', {}, {}, 0x0, 0x64, 0x3, 0x10}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x1, 0x4d], 0xed7, 0x0, 0x3}}, @common=@eui64={{0x28}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @port=0x4e22, @port=0x4e21}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private2, [0xff, 0xffffffff, 0xff, 0xffffffff], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth0_virt_wifi\x00', 'macvlan1\x00', {}, {}, 0x6c, 0xef, 0x4}, 0x0, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x1d, [{0xffff, 0x1f, 0x4}, {0x6, 0x4, 0xff, 0x9}, {0x8, 0x20, 0x1, 0x3}, {0x6, 0x4, 0xa0}, {0x200, 0x8, 0x5, 0x80000000}, {0x2, 0x1f, 0x0, 0xffffffff}, {0xfffb, 0x9, 0x80, 0x7fffffff}, {0x5, 0x4, 0x1, 0xc6c}, {0x101, 0xc1, 0x8, 0x4}, {0xd80, 0x8e, 0x4, 0xffff}, {0x0, 0x4, 0x7, 0xfffffff8}, {0x7a, 0x1, 0x90, 0x53e}, {0x9fb4, 0x46, 0xea, 0x3}, {0x100, 0x40, 0x20, 0x80000001}, {0x5, 0x0, 0x4, 0x934}, {0x3, 0xff, 0xc2, 0x10001}, {0xff, 0x4, 0x3, 0xffff4555}, {0x83e, 0x6, 0x34, 0xa16}, {0x1, 0x20, 0x2, 0x4}, {0x85, 0x0, 0x6, 0x1ff}, {0x4, 0x80, 0x8, 0x207}, {0x8000, 0xd6, 0x4, 0x9}, {0x0, 0x0, 0x0, 0x6}, {0x7, 0x1f, 0x1f, 0x40}, {0x100, 0x9, 0x0, 0x6}, {0x0, 0x0, 0x8, 0x81}, {0x3, 0xab, 0x5, 0xf1}, {0x3, 0x0, 0x1, 0x2}, {0x4, 0x7f, 0xff, 0x400}, {0x2aba, 0x7, 0x4, 0x8}, {0x200, 0x7, 0x9, 0x4}, {0x6, 0x0, 0x37, 0x1ff}, {0xf804, 0x25, 0x1, 0x7}, {0x470, 0x20, 0x7, 0x6}, {0x81, 0x80, 0x23}, {0x6548, 0xff, 0x8, 0x3}, {0x7ff, 0xf5, 0x87, 0x1}, {0x6, 0xff, 0x0, 0x6}, {0x8, 0x66, 0x0, 0x6}, {0x1000, 0x0, 0xc8, 0x80000001}, {0x85, 0x7, 0x7, 0x4}, {0x5, 0x84, 0x1e, 0x7fffffff}, {0x8, 0x21, 0x5, 0x5}, {0x0, 0x1f, 0x3, 0x80000001}, {0x9, 0x36, 0x40, 0x5}, {0x200, 0x5, 0x7, 0x28b}, {0xdd1, 0x20, 0x3f, 0x10001}, {0x9, 0x7, 0x2, 0x72}, {0x8, 0x3, 0x40}, {0x95e, 0x1, 0xff, 0x4}, {0xfffe, 0xc1, 0x1, 0xe57f}, {0x5db, 0x2, 0xff, 0x4}, {0x100, 0x5, 0x40}, {0x847f, 0xc3, 0x5, 0x5}, {0x7fff, 0x1, 0x40}, {0x1, 0xff, 0x3f, 0x3}, {0x400, 0x0, 0x5}, {0x7, 0x9, 0x4, 0x1}, {0x800, 0xb0, 0x4, 0x40}, {0xe126, 0x8, 0x81, 0xe860}, {0x100, 0x20, 0xf, 0x401}, {0x8, 0x2, 0x3, 0x4}, {0x3, 0xd8, 0x0, 0x6542}, {0x243f, 0x6, 0x80, 0xc4e}], {0xfff}}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@local, @ipv4=@remote, @gre_key=0x8, @port=0x4e22}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @mcast1, [0xffffffff, 0xff000000, 0x0, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'macvlan1\x00', 'nicvf0\x00', {0xedb4b7abf038b0f3}, {0xff}, 0x0, 0x1a, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x2, 0xc1}}, @common=@mh={{0x28}, {"afef"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}, @port=0x4e20, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@private2, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}, @gre_key=0xdbf, @icmp_id=0x65}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="21a826816df8167097c1ca0c6974ca1da5991f0c0c232315ba682a2967b8aefea1ad55d6b7b45b749645c0a734d37be8aa92de0fbef627545c43d08700710cae7b5de97ee4bbca5f072fbebb94329a6833f7ad6dc68fdde39ab1bbf3d0ffcdd4912fe336a357310921dea22845d7885341"]) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x768, 0x148, 0x148, 0xffffffff, 0x148, 0x5a8, 0x698, 0x698, 0xffffffff, 0x698, 0x698, 0x5, &(0x7f0000000040), {[{{@ipv6={@mcast2, @private0, [0xff000000, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'tunl0\x00', '\x00', {}, {}, 0x0, 0x64, 0x3, 0x10}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x1, 0x4d], 0xed7, 0x0, 0x3}}, @common=@eui64={{0x28}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @port=0x4e22, @port=0x4e21}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private2, [0xff, 0xffffffff, 0xff, 0xffffffff], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth0_virt_wifi\x00', 'macvlan1\x00', {}, {}, 0x6c, 0xef, 0x4}, 0x0, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x1d, [{0xffff, 0x1f, 0x4}, {0x6, 0x4, 0xff, 0x9}, {0x8, 0x20, 0x1, 0x3}, {0x6, 0x4, 0xa0}, {0x200, 0x8, 0x5, 0x80000000}, {0x2, 0x1f, 0x0, 0xffffffff}, {0xfffb, 0x9, 0x80, 0x7fffffff}, {0x5, 0x4, 0x1, 0xc6c}, {0x101, 0xc1, 0x8, 0x4}, {0xd80, 0x8e, 0x4, 0xffff}, {0x0, 0x4, 0x7, 0xfffffff8}, {0x7a, 0x1, 0x90, 0x53e}, {0x9fb4, 0x46, 0xea, 0x3}, {0x100, 0x40, 0x20, 0x80000001}, {0x5, 0x0, 0x4, 0x934}, {0x3, 0xff, 0xc2, 0x10001}, {0xff, 0x4, 0x3, 0xffff4555}, {0x83e, 0x6, 0x34, 0xa16}, {0x1, 0x20, 0x2, 0x4}, {0x85, 0x0, 0x6, 0x1ff}, {0x4, 0x80, 0x8, 0x207}, {0x8000, 0xd6, 0x4, 0x9}, {0x0, 0x0, 0x0, 0x6}, {0x7, 0x1f, 0x1f, 0x40}, {0x100, 0x9, 0x0, 0x6}, {0x0, 0x0, 0x8, 0x81}, {0x3, 0xab, 0x5, 0xf1}, {0x3, 0x0, 0x1, 0x2}, {0x4, 0x7f, 0xff, 0x400}, {0x2aba, 0x7, 0x4, 0x8}, {0x200, 0x7, 0x9, 0x4}, {0x6, 0x0, 0x37, 0x1ff}, {0xf804, 0x25, 0x1, 0x7}, {0x470, 0x20, 0x7, 0x6}, {0x81, 0x80, 0x23}, {0x6548, 0xff, 0x8, 0x3}, {0x7ff, 0xf5, 0x87, 0x1}, {0x6, 0xff, 0x0, 0x6}, {0x8, 0x66, 0x0, 0x6}, {0x1000, 0x0, 0xc8, 0x80000001}, {0x85, 0x7, 0x7, 0x4}, {0x5, 0x84, 0x1e, 0x7fffffff}, {0x8, 0x21, 0x5, 0x5}, {0x0, 0x1f, 0x3, 0x80000001}, {0x9, 0x36, 0x40, 0x5}, {0x200, 0x5, 0x7, 0x28b}, {0xdd1, 0x20, 0x3f, 0x10001}, {0x9, 0x7, 0x2, 0x72}, {0x8, 0x3, 0x40}, {0x95e, 0x1, 0xff, 0x4}, {0xfffe, 0xc1, 0x1, 0xe57f}, {0x5db, 0x2, 0xff, 0x4}, {0x100, 0x5, 0x40}, {0x847f, 0xc3, 0x5, 0x5}, {0x7fff, 0x1, 0x40}, {0x1, 0xff, 0x3f, 0x3}, {0x400, 0x0, 0x5}, {0x7, 0x9, 0x4, 0x1}, {0x800, 0xb0, 0x4, 0x40}, {0xe126, 0x8, 0x81, 0xe860}, {0x100, 0x20, 0xf, 0x401}, {0x8, 0x2, 0x3, 0x4}, {0x3, 0xd8, 0x0, 0x6542}, {0x243f, 0x6, 0x80, 0xc4e}], {0xfff}}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@local, @ipv4=@remote, @gre_key=0x8, @port=0x4e22}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @mcast1, [0xffffffff, 0xff000000, 0x0, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'macvlan1\x00', 'nicvf0\x00', {0xedb4b7abf038b0f3}, {0xff}, 0x0, 0x1a, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x2, 0xc1}}, @common=@mh={{0x28}, {"afef"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}, @port=0x4e20, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@private2, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}, @gre_key=0xdbf, @icmp_id=0x65}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) (async) 00:12:03 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0x0, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}]}) 00:12:03 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="600000004a0000022bbd7000fedbdf250a004000", @ANYRES32=r0, @ANYBLOB="0900000014000100fe80000000000000000000000000001614000100ff01000000000000000000000000000114000100fc020000000000000000000000000001080002000b000000c6b29e8e206ecb2667f35a63cf9f6a7efae2cb6f3ed17023e418a1e75e459fcba7fd4c55109970eea11feb15c95fb01276c977be835038b8d94a407dbdfd5bbe57e9401f58df003c18b8343276dba0d53f79c66a730b62b740484d727c0d39edf21d36abb44027d2f16fb40c698a546b225dec3ecf"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000080), 0x4c8, 0x20000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x10000000}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7fff}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000804}, 0x40440c0) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}]}) 00:12:03 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, 0x0) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="600000004a0000022bbd7000fedbdf250a004000", @ANYRES32=r0, @ANYBLOB="0900000014000100fe80000000000000000000000000001614000100ff01000000000000000000000000000114000100fc020000000000000000000000000001080002000b000000c6b29e8e206ecb2667f35a63cf9f6a7efae2cb6f3ed17023e418a1e75e459fcba7fd4c55109970eea11feb15c95fb01276c977be835038b8d94a407dbdfd5bbe57e9401f58df003c18b8343276dba0d53f79c66a730b62b740484d727c0d39edf21d36abb44027d2f16fb40c698a546b225dec3ecf"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x1) (async) r1 = syz_open_dev$audion(&(0x7f0000000080), 0x4c8, 0x20000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) (async) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x10000000}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7fff}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000804}, 0x40440c0) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}]}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100", @ANYRES32]) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{}, {}]}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="600000004a0000022bbd7000fedbdf250a004000", @ANYRES32=r0, @ANYBLOB="0900000014000100fe80000000000000000000000000001614000100ff01000000000000000000000000000114000100fc020000000000000000000000000001080002000b000000c6b29e8e206ecb2667f35a63cf9f6a7efae2cb6f3ed17023e418a1e75e459fcba7fd4c55109970eea11feb15c95fb01276c977be835038b8d94a407dbdfd5bbe57e9401f58df003c18b8343276dba0d53f79c66a730b62b740484d727c0d39edf21d36abb44027d2f16fb40c698a546b225dec3ecf"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x1) (async) r1 = syz_open_dev$audion(&(0x7f0000000080), 0x4c8, 0x20000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) (async) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x10000000}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x7fff}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000804}, 0x40440c0) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5100000000000000000000000000100"]) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{}, {}]}) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32]) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x2, [{}, {}]}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0}) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x3, [{0xffffffffffffffff, 0x0, 0x0, 0x2000}, {}, {}]}) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32]) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) 00:12:03 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x3, [{}, {}, {}]}) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0}) (async) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0}) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32]) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:12:03 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, r0}) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) 00:12:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:03 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x100, &(0x7f0000000040)) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x80000, 0x25, 0x8}, 0x18) renameat(r1, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='/dev/virtual_nci\x00') openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x0, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:03 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x200, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r4 = getpid() sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)="141d526d022db407d0936398b5b4273cea9645363d11938431dd9f13e3f4bfa52eb784617ec9702c245c9aa28f94a618ef2027037bd328a851ba5d56e03e0e12f52a59098401dac6aed5f2b79d505545bc12c13cfd5feb536cfd6babfdcde69ab226e27d53ece61288fd691fcd8bccbf32598801a3ab49604ea342189f67b1320ac7717676274c650ec1938061735a633d72b7b727147760abb67dcd130466e65ad22de026ae77b862f565762088f563ccb31f954fe88abcc7ab527b6a46f22f9d6bfb23d410d0f8ca42597ff179", 0xce}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="1c000000000000000100000002800600", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x40010}, 0x4000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:12:03 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 00:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async, rerun: 32) statx(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x100, &(0x7f0000000040)) (async, rerun: 32) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x80000, 0x25, 0x8}, 0x18) renameat(r1, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='/dev/virtual_nci\x00') (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e51000000000"]) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x0, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x3, [{0xffffffffffffffff, 0x0, 0x2000, 0x2000}, {}, {}]}) 00:12:04 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) r1 = getpid() syz_open_procfs$userns(r1, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x200, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) (async) r4 = getpid() sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)="141d526d022db407d0936398b5b4273cea9645363d11938431dd9f13e3f4bfa52eb784617ec9702c245c9aa28f94a618ef2027037bd328a851ba5d56e03e0e12f52a59098401dac6aed5f2b79d505545bc12c13cfd5feb536cfd6babfdcde69ab226e27d53ece61288fd691fcd8bccbf32598801a3ab49604ea342189f67b1320ac7717676274c650ec1938061735a633d72b7b727147760abb67dcd130466e65ad22de026ae77b862f565762088f563ccb31f954fe88abcc7ab527b6a46f22f9d6bfb23d410d0f8ca42597ff179", 0xce}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="1c000000000000000100000002800600", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x40010}, 0x4000) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x0, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:04 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="21a826816df8167097c1ca0c6974ca1da5991f0c0c232315ba682a2967b8aefea1ad55d6b7b45b749645c0a734d37be8aa92de0fbef627545c43d08700710cae7b5de97ee4bbca5f072fbebb94329a6833f7ad6dc68fdde39ab1bbf3d0ffcdd4912fe336a357310921dea22845d7885341"]) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@nat={'nat\x00', 0x1b, 0x5, 0x768, 0x148, 0x148, 0xffffffff, 0x148, 0x5a8, 0x698, 0x698, 0xffffffff, 0x698, 0x698, 0x5, &(0x7f0000000040), {[{{@ipv6={@mcast2, @private0, [0xff000000, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xff000000, 0xffffffff, 0xff], 'tunl0\x00', '\x00', {}, {}, 0x0, 0x64, 0x3, 0x10}, 0x0, 0x100, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x1, 0x4d], 0xed7, 0x0, 0x3}}, @common=@eui64={{0x28}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @port=0x4e22, @port=0x4e21}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private2, [0xff, 0xffffffff, 0xff, 0xffffffff], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth0_virt_wifi\x00', 'macvlan1\x00', {}, {}, 0x6c, 0xef, 0x4}, 0x0, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x1d, [{0xffff, 0x1f, 0x4}, {0x6, 0x4, 0xff, 0x9}, {0x8, 0x20, 0x1, 0x3}, {0x6, 0x4, 0xa0}, {0x200, 0x8, 0x5, 0x80000000}, {0x2, 0x1f, 0x0, 0xffffffff}, {0xfffb, 0x9, 0x80, 0x7fffffff}, {0x5, 0x4, 0x1, 0xc6c}, {0x101, 0xc1, 0x8, 0x4}, {0xd80, 0x8e, 0x4, 0xffff}, {0x0, 0x4, 0x7, 0xfffffff8}, {0x7a, 0x1, 0x90, 0x53e}, {0x9fb4, 0x46, 0xea, 0x3}, {0x100, 0x40, 0x20, 0x80000001}, {0x5, 0x0, 0x4, 0x934}, {0x3, 0xff, 0xc2, 0x10001}, {0xff, 0x4, 0x3, 0xffff4555}, {0x83e, 0x6, 0x34, 0xa16}, {0x1, 0x20, 0x2, 0x4}, {0x85, 0x0, 0x6, 0x1ff}, {0x4, 0x80, 0x8, 0x207}, {0x8000, 0xd6, 0x4, 0x9}, {0x0, 0x0, 0x0, 0x6}, {0x7, 0x1f, 0x1f, 0x40}, {0x100, 0x9, 0x0, 0x6}, {0x0, 0x0, 0x8, 0x81}, {0x3, 0xab, 0x5, 0xf1}, {0x3, 0x0, 0x1, 0x2}, {0x4, 0x7f, 0xff, 0x400}, {0x2aba, 0x7, 0x4, 0x8}, {0x200, 0x7, 0x9, 0x4}, {0x6, 0x0, 0x37, 0x1ff}, {0xf804, 0x25, 0x1, 0x7}, {0x470, 0x20, 0x7, 0x6}, {0x81, 0x80, 0x23}, {0x6548, 0xff, 0x8, 0x3}, {0x7ff, 0xf5, 0x87, 0x1}, {0x6, 0xff, 0x0, 0x6}, {0x8, 0x66, 0x0, 0x6}, {0x1000, 0x0, 0xc8, 0x80000001}, {0x85, 0x7, 0x7, 0x4}, {0x5, 0x84, 0x1e, 0x7fffffff}, {0x8, 0x21, 0x5, 0x5}, {0x0, 0x1f, 0x3, 0x80000001}, {0x9, 0x36, 0x40, 0x5}, {0x200, 0x5, 0x7, 0x28b}, {0xdd1, 0x20, 0x3f, 0x10001}, {0x9, 0x7, 0x2, 0x72}, {0x8, 0x3, 0x40}, {0x95e, 0x1, 0xff, 0x4}, {0xfffe, 0xc1, 0x1, 0xe57f}, {0x5db, 0x2, 0xff, 0x4}, {0x100, 0x5, 0x40}, {0x847f, 0xc3, 0x5, 0x5}, {0x7fff, 0x1, 0x40}, {0x1, 0xff, 0x3f, 0x3}, {0x400, 0x0, 0x5}, {0x7, 0x9, 0x4, 0x1}, {0x800, 0xb0, 0x4, 0x40}, {0xe126, 0x8, 0x81, 0xe860}, {0x100, 0x20, 0xf, 0x401}, {0x8, 0x2, 0x3, 0x4}, {0x3, 0xd8, 0x0, 0x6542}, {0x243f, 0x6, 0x80, 0xc4e}], {0xfff}}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@local, @ipv4=@remote, @gre_key=0x8, @port=0x4e22}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @local}, @mcast1, [0xffffffff, 0xff000000, 0x0, 0xffffffff], [0xff, 0x0, 0xff000000, 0xff000000], 'macvlan1\x00', 'nicvf0\x00', {0xedb4b7abf038b0f3}, {0xff}, 0x0, 0x1a, 0x3}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x2, 0xc1}}, @common=@mh={{0x28}, {"afef"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}, @port=0x4e20, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv6=@private2, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}, @gre_key=0xdbf, @icmp_id=0x65}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x7c8) 00:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x100, &(0x7f0000000040)) (async) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x80000, 0x25, 0x8}, 0x18) renameat(r1, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='/dev/virtual_nci\x00') (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) sendmsg$unix(r0, 0x0, 0x0) r1 = getpid() syz_open_procfs$userns(r1, 0x0) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x200, &(0x7f0000000200)) (async) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x200, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r4 = getpid() sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)="141d526d022db407d0936398b5b4273cea9645363d11938431dd9f13e3f4bfa52eb784617ec9702c245c9aa28f94a618ef2027037bd328a851ba5d56e03e0e12f52a59098401dac6aed5f2b79d505545bc12c13cfd5feb536cfd6babfdcde69ab226e27d53ece61288fd691fcd8bccbf32598801a3ab49604ea342189f67b1320ac7717676274c650ec1938061735a633d72b7b727147760abb67dcd130466e65ad22de026ae77b862f565762088f563ccb31f954fe88abcc7ab527b6a46f22f9d6bfb23d410d0f8ca42597ff179", 0xce}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="1c000000000000000100000002800600", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x40010}, 0x4000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x0, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x0, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:04 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 3: ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:04 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) (async) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) (async) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) (async) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) (async) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) (async) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) (async) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) (async) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) (async) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) (async) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 3: ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) (async) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 64) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) (async, rerun: 64) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 32) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) (rerun: 32) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) (async) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) (async, rerun: 64) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) (async, rerun: 64) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) (async) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {0xffffffffffffffff, 0x0, 0x1000000000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x4000, 0x4000}]}) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:04 executing program 3: ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:12:04 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000080), 0x8001, 0x40400) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:12:04 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x0, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xfffffffffffffe59) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffff0000000}) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x80000001, 0x404080) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x5, [{r1, 0x0, 0x2000, 0x2000}, {}, {r2, 0x0, 0x0, 0x1000000}, {r3, 0x0, 0x1000000000000, 0x2000}, {r4, 0x0, 0x4000, 0x4000}]}) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x0, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000080), 0x8001, 0x40400) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x0, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB]) 00:12:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x1ff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x24004086) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffc, 0x100000000, 0x1000000000000}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 4: r0 = ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000000)={0x0, 0x8, [{0xffffffffffffffff, 0x0, 0xfffff000}, {0xffffffffffffffff, 0x0, 0xfffffffff0000000, 0x2000}, {0xffffffffffffffff, 0x0, 0x0, 0x1000000000000}, {0xffffffffffffffff, 0x0, 0x8000, 0x2000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}, {0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x10000}, {0xffffffffffffffff, 0x0, 0x8000, 0xfffffffff0000000}, {0xffffffffffffffff, 0x0, 0x1000, 0x100000000}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS32(0xffffffffffffffff, 0x80585414, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000300)={0x4, &(0x7f0000000280)=[{@none}, {@fixed}, {}, {@none}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x0, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf42"]) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x0, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x1ff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x24004086) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffc, 0x100000000, 0x1000000000000}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000080), 0x8001, 0x40400) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) syz_open_dev$audion(&(0x7f0000000080), 0x8001, 0x40400) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) 00:12:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x0, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r9 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r9, 0x0, 0x0) recvmsg$kcm(r9, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r10, 0xc0189375, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r11, 0xc0189375, 0x0) setresgid(r8, r7, r8) r12 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r12, 0x0, 0x0) r13 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r12, &(0x7f0000000e40)='./file0\x00', r13, &(0x7f0000000f00)='./file0\x00', 0x7) r14 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) r15 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) r16 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)="b00c0bf45a355ff89e80395d03f77c08a6b5babadae870960a27b5fdf5d55a4172b6d02ef508f2b9df75ec3b12bf4d7d901fdfab6fe4f61d089f17b0b64906ffaf0a2f3d24f2aa423955e6968b9ef53e42d1b64d8b043e6993271910af435e1419aaa8ef1800b51a9e6e3c915930cdf7d6323efdfec5b35ce58a5cc09b8252b6cb6a540b202d3fc0bdc2ecd79dd443cf250531ba57dbdcf32bd71a300a45c587ef729f917d50c6086ae7a22c6a48add2fa4fbd9163e8c880d6566f376df7f99becc01023cff08719f5426c8f49fda9eb4e38c4969488dea287a539d8ab97cf5b472d7f5473", 0xe5}, {&(0x7f0000000180)="53040b243121ddfd8faf", 0xa}], 0x2, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r2, r3, r4, r5, r10, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r11, 0xffffffffffffffff, 0xffffffffffffffff, r14, r15, 0xffffffffffffffff, r16, 0xffffffffffffffff]}}], 0x68, 0x810}, 0x40) 00:12:04 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf42"]) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x0, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0xa8c43) sendmsg$unix(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000140)=""/235, 0xeb}], 0x5, &(0x7f00000002c0)=""/74, 0x4a}, 0x40002000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x0, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8, 0x2f, 0x1ff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x24004086) (async) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0xfffffffc, 0x100000000, 0x1000000000000}) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:04 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) r7 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r7, 0x0, 0x0) r8 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r7, &(0x7f0000000e40)='./file0\x00', r8, &(0x7f0000000f00)='./file0\x00', 0x7) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) 00:12:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x0, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf42"]) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) r7 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r7, 0x0, 0x0) r8 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r7, &(0x7f0000000e40)='./file0\x00', r8, &(0x7f0000000f00)='./file0\x00', 0x7) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) 00:12:05 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x0, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 00:12:05 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220"]) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) (async) socket$bt_cmtp(0x1f, 0x3, 0x5) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) r7 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r7, 0x0, 0x0) r8 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r7, &(0x7f0000000e40)='./file0\x00', r8, &(0x7f0000000f00)='./file0\x00', 0x7) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f00000002c0)={0xffffffffffffffff, 0x1, 0x4000, 0x1000000000000}) 00:12:05 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) r0 = getpgid(0x0) syz_open_procfs$namespace(r0, &(0x7f0000000180)='ns/cgroup\x00') r1 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r1, &(0x7f00000000c0)) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000080)) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220"]) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYRES32, @ANYBLOB="00cf4220"]) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) r7 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r7, 0x0, 0x0) r8 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) renameat2(r7, &(0x7f0000000e40)='./file0\x00', r8, &(0x7f0000000f00)='./file0\x00', 0x7) 00:12:05 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x3c, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) r7 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r7, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 722.382809][T26882] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_cmd_wq": -EINTR [ 725.381985][T27548] __nla_validate_parse: 3 callbacks suppressed [ 725.381999][T27548] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:05 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000002000000", @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x3c, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="00cf4220e5"]) [ 725.450786][T27576] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x3c, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:05 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) connect$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x2, {0x2, 0x0, 0x2}, 0xfe}, 0x18) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 725.488319][T27581] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:05 executing program 4: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, r1, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xffff}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x64}, 0x1, 0x0, 0x0, 0x894}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1a, 0x800, 0x9, 0x5, 0x241e, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x48) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) setresgid(r3, r2, r3) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 5: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) (async) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x0, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) (rerun: 64) connect$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x2, {0x2, 0x0, 0x2}, 0xfe}, 0x18) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x0, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x4040000000000000) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) connect$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x2, {0x2, 0x0, 0x2}, 0xfe}, 0x18) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) connect$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x2, {0x2, 0x0, 0x2}, 0xfe}, 0x18) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x0, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0xa8c8658effff0000) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x0, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x8a16000000000000) 00:12:05 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x2, 0xa, 0x3}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 3: openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x8) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040), 0x200, 0x180) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x0, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x0, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 4: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:05 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x2, 0xa, 0x3}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:05 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:05 executing program 3: openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x8) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040), 0x200, 0x180) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 4: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000009c0)={&(0x7f0000000780)=@nfc, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000a40)=""/188, 0xbc}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/192, 0xc0}], 0x5, &(0x7f0000000d80)=""/150, 0x96}, 0x20a0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000001022b003acb65624bd42b0500a32c35174b6d51706851b5384e1efed27f33fd1b3ef6122e0e4d109b542fedb3ef7205fabffb", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,default_permissions,max_read=0x00000000073b0000,fsname=/dev/autofs\x00,smackfsdef=/dev/autofs\x00,\x00']) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 3: openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x8) (async) openat$damon_target_ids(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x8) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040), 0x200, 0x180) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x2, 0xa, 0x3}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x5, 0x2, 0xa, 0x3}) (async) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0xffffffffffff0000, 0x18000) sendmsg$unix(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x10) [ 726.188640][T27735] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_cmd_wq": -EINTR [ 726.271674][T27745] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:06 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000200", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) memfd_create(&(0x7f0000000280)='{)', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000200", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async, rerun: 32) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (rerun: 32) sendmsg$unix(r0, 0x0, 0x0) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0xffffffffffff0000, 0x18000) sendmsg$unix(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x10) 00:12:06 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:06 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0xffffffffffff0000, 0x18000) sendmsg$unix(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x10) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000200", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) statx(r1, &(0x7f0000002280)='./file0\x00', 0x100, 0x8, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000040)="7d8621acdd13638740fcbebc9edefb3bb98d4fee4a1fd14bab5af622d6fe027facaf2b6546b004bf0660252a3588bfc8a5340bc4bc09a586cd193495b4199a6a361ededa6be87a71fd2c3ceef32df2710631a52c4f1823d909477382e28292310f92e2586e94e17d49e2ae5a41969666fcc8066c350d858842babf9c06a3c4205d98b56ac1f2effd37a190561c7b51dd0a6c860829013bd5b8117bb1b57f135d626e4923e343413df0a048024331eacd5604d7864e8d4a2b662d3c884c2bfb9af5f36636d5f9e9684ef98b49336c26a87648b4f5974851075812db8a", 0xdc}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="780a898973bf695d94bb438609fa33f355bcda1f8590b00f59751bc8d6b9fab5cc484fe904fb5ce4a82be25a5416f31ce9def82d318452923e1ad4a08bbe6fc5f947f9e25a1d8a7653d7818ef5b5f0d57e6b5da95dd4cba3f7f10ca0a02f8f4b20a10fb14904c2abbd29944e9de7df8b3015", 0x72}, {&(0x7f00000011c0)="29d5c99a170c1b31212a2a0dea4a7f510c067d48dbbc12aba711a7bc39a199cd042e", 0x22}, {&(0x7f0000001200)="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", 0x1000}], 0x5, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, r2}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x38, 0x40}, 0x24004080) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000020000", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x6c00000000000000) 00:12:06 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) (async) r2 = syz_open_dev$audion(0x0, 0xffffffffffff0000, 0x18000) sendmsg$unix(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x10) 00:12:06 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x0, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:06 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000020000", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:06 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x6c00000000000000) 00:12:06 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) statx(r1, &(0x7f0000002280)='./file0\x00', 0x100, 0x8, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000040)="7d8621acdd13638740fcbebc9edefb3bb98d4fee4a1fd14bab5af622d6fe027facaf2b6546b004bf0660252a3588bfc8a5340bc4bc09a586cd193495b4199a6a361ededa6be87a71fd2c3ceef32df2710631a52c4f1823d909477382e28292310f92e2586e94e17d49e2ae5a41969666fcc8066c350d858842babf9c06a3c4205d98b56ac1f2effd37a190561c7b51dd0a6c860829013bd5b8117bb1b57f135d626e4923e343413df0a048024331eacd5604d7864e8d4a2b662d3c884c2bfb9af5f36636d5f9e9684ef98b49336c26a87648b4f5974851075812db8a", 0xdc}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="780a898973bf695d94bb438609fa33f355bcda1f8590b00f59751bc8d6b9fab5cc484fe904fb5ce4a82be25a5416f31ce9def82d318452923e1ad4a08bbe6fc5f947f9e25a1d8a7653d7818ef5b5f0d57e6b5da95dd4cba3f7f10ca0a02f8f4b20a10fb14904c2abbd29944e9de7df8b3015", 0x72}, {&(0x7f00000011c0)="29d5c99a170c1b31212a2a0dea4a7f510c067d48dbbc12aba711a7bc39a199cd042e", 0x22}, {&(0x7f0000001200)="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", 0x1000}], 0x5, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, r2}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x38, 0x40}, 0x24004080) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getpid() (async) syz_open_procfs$userns(r0, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r1, 0x0, 0x0) (async) statx(r1, &(0x7f0000002280)='./file0\x00', 0x100, 0x8, &(0x7f00000022c0)) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000040)="7d8621acdd13638740fcbebc9edefb3bb98d4fee4a1fd14bab5af622d6fe027facaf2b6546b004bf0660252a3588bfc8a5340bc4bc09a586cd193495b4199a6a361ededa6be87a71fd2c3ceef32df2710631a52c4f1823d909477382e28292310f92e2586e94e17d49e2ae5a41969666fcc8066c350d858842babf9c06a3c4205d98b56ac1f2effd37a190561c7b51dd0a6c860829013bd5b8117bb1b57f135d626e4923e343413df0a048024331eacd5604d7864e8d4a2b662d3c884c2bfb9af5f36636d5f9e9684ef98b49336c26a87648b4f5974851075812db8a", 0xdc}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="780a898973bf695d94bb438609fa33f355bcda1f8590b00f59751bc8d6b9fab5cc484fe904fb5ce4a82be25a5416f31ce9def82d318452923e1ad4a08bbe6fc5f947f9e25a1d8a7653d7818ef5b5f0d57e6b5da95dd4cba3f7f10ca0a02f8f4b20a10fb14904c2abbd29944e9de7df8b3015", 0x72}, {&(0x7f00000011c0)="29d5c99a170c1b31212a2a0dea4a7f510c067d48dbbc12aba711a7bc39a199cd042e", 0x22}, {&(0x7f0000001200)="6bd103c479fcb74120fabad8010aedc096375dc577f863b205eddb65f515da82cfbda8fd34f751ceaa9e1bb5a92c42bb6f41d4711b32464f58a7e971388efffc17102a824f7358ba76c0231e74cbae7353a3f1f52200e3184b5a97934a2c630757060d6d73840c2fbe0f6d93ff1da8cc0a8d32b3c74e82cc2708e2713c8bf2bcd3d0058077b52d9bc35a9bb8b5d7606154d3c1a10acec0033ddf5f25d3bca85b931d93922e13e6fbdf592a53ad65b2d3a63f82167681b5a499cb9ceb394dd3840ded87b51a22d439209a4c27d46b3300a9440f233bd1b072264724a08a111a8e2293a9eaac8032687096b2c1615c94bdc253887f3f5a349a18d38240c0dc07474126f71803944fc7b27f82a9ac6809c29e534d71975fbee6bea8b2e580b1d5efd72a9c7d0337a4db09fd4a24ecd5f4eff669d58650175e4d4d95db7932a0c92c9340f18e7f46b723c852e31612bbee00b48c6ee734b8e04f18b2e3f2b14d0fd98a11e5b2f1d46b84bb4a9e6dd99a1e22a387a6cb8e6f665f9cc88e520f4cf1b4725a976edf82c61c7a4cf8cc39acaa89717c105abbed0a4d71647e5efd610b8ec567310ab0382a733f719c12337b67d55ae2594b7cf3c43e0fda8e1de35924e4d6647ac189ee8b3e2d0c8b0649cd08170a17e7bba970deae58a62afc362de04fc97ffe09d8081aff5c2b428085323cfce977aa9d07955f2a95a21b0553a077695d4d11f74439a22d7d72f00db713b488d536dce8ee82ffac7010544d4da35915623e83ddbdb800ce9707ac74913edb6a3e75127b09334cf7e02b271fee86ed000a278affb15d01a9cc9ea2e1f77a7b853f3fe703353c7f59bd9556123a6e5e5ad2b750e8e4ecfa014ad28be4fc9e0ea610e7d75daa5586717196af9383b41ceee04b85dbc3e03d11fdb77d377e510860f547cbb3a125d11fc463bd305a38a8c19a9bfe60cd14a8800e9583f22aacd45f31b65c540b945176ced705e73f9683bedb684fcccf8823834e7d6e8d3b8b252f72081742100cbab2460f7ec7913b89dce810975e70d60ba109f45fe0d3978f35228a2108d8990c57debb50163d2e8dd01a7c09d8b0ed903f84c0f5c86b05741da8e0648778f9dd3bf9195e295a8b97c1765decf60ac2bc2046bd3728b881a4035a7161bfae6d2b2715bca83685acccfefde75fbefc3c9bbd8e93ec897c8344b05392a6c95ae5f71a7c4edf62befec1bdac3758eb98840332d83f3f037a4330fcae1f28e847a3d2b9aafdb80b96d28ee5d1ac65da944f308f6fbbba9c6977a31357b5d1d5f2212d8aa7d831afd7477e9ba0e7d54bf959499a71a77ad0eb49395d4d08833319ae64c133f187343f3a855f7017694e2876180dc06c45de815db926468233de3c36e8bf4bddcf7dda2c4098890a77f6c5d62834ff3fdcb7733bc5fb58f96b534c7b247d0687535d41df25559c5495d241030c4cc97bce8391a403e8b273c786cc752ca01912ddd92290ea4a8123a2ee7604370a488420a8f763a2a2d95e199566e97114c671b96e5699d06e83587b3ac8c86c8752573d2e69c2a9b575a88467535c67305faa98402af3eca1fd658aeb03fd13758d6d5b9676728797f3881f466e983074422d8c8da7d459933b31fde5a048716ac156714a49723dcc5ae3286f0de14610bb97dba9235777ad3be1b58232f4cbfa2949ba292a53cdbddb88ea0b8779b2062fc8bab43e49a30b149ef0671f13b0ae94bed684d34de19647477513a3afe889a37000c8939e4c9971cb5df6bf7947e677c9154ecee28c35df55bd191c97f6ed98bc6f36f01cfd5f9657593868f5fc3212897a7e09153e570cf9a8a0669379da23ce620d1a1463df500240970feff87b1d87a0186547bf5c529866b2fa31b77e1ac64cb2e4803f8bb370bd8a6b728b7b0925518c05e6cef3f8a46154d4d5204b43a26e7a5cf793c3317f803554e49bebf0557203469e10958262ed02e4e0380d8feb97b6220d34fef5e07e29092ab877317956450f4cd8b3049df1ab53cc6f8626698df7f616703bb4baa225aba89ed5a3a721582c6707cb40e2ab10682a0e484808ab7828ec1079f43374838f8bab8b466fcc35f86e46512b3d87380af2cd5aab4cca6c576133b243ac210a62d33e58455e0c693f36b2a34f43a15018ec04eebea979ed964c7e2d1cb5a1b67366316895128c5b802a7a4b681a8a72e7ccb630239abebab88f74ae6e7547d1177ea13a4768ade46bd33baa6184e17ccdf7af4458ed057a44a5e04967ca8f2b882366b6bef77ec0eda97b98841ec409058fef91025c82926b2b3b6a478e76a357e021e9c71126001f5fdf4636f9054daa8185b5fecd2e959331e892b8245063071ceb8191af948e1ac5b00d5c0e75e5127b3f7fe9ebe8acdedfba5b0b80d7b974bf53c1de6497f6ba9fcbe6e33921f68112d8fe7f3be84b4c18090531cacdae0d7c9f9bb5a49f21ebaf840401137ae21bc000eeb9d3fd730a52018183292328807c5c8eb11d9713df952e8d966c1b2feba8e3f9ef21072fc1b7e4ed8505c6d444e3e72d3879d2a341640959b507c0282f256d61304fc6cba523358ee95881aa86987b4aeefa1f91079a26bbf6e488ea80000844aa47314083b76dad75bf7ba0f615dd270d6d3cd35dd0dac09f24e3acc37e10fe722d2e6fddeb0912efdd572cff02c2011b7dda8ca8aa824764f02edd37d1bb45b72a1f4015833f30487790143ca3fca23d9ee593dd538e3b2b1fd64b94be9b0648de61780f5950637d1998e1579df648a53a77ed92add3b3006dd4ac8f940b96644ddef4ee4e63fd65646e76db1dfdc953f23f2ee95dad8b671ecdb28e46892f874d5ac12f1fae79e5803c830dd43832670f180cc0e205061f74d576f4ef0283f83f158d2a4fd0e2473891c7d78a7e87a1107a3497c88224cf31152fff532b2f36e3f2fa8f51ddfe8d2a8a50b4dbb1b3d1fd84bf39eb7561cc71918c9c53f22697b86776f33a4c696818eeeabdbf584ea3b6b17077355bbdf0170f948dfa049cd0865ad220dbfef77540da5613f4e7a510ff89ae995736712c7a503ff8b532e59cda37931c1d58f1bdacc2465cd80b03ae640e8a14502da0b52af35e0bece7549042192a39bd9cf505bb4b5f6efa7459fdc69e4f228bf2d48242239e71472ff9a528cde318ce181b4177102b8db07ed3a88a4dfe53cd9499f66ab119f760d2fc968287d35fd1ef66afb782d4cf7ac71bde1bdb7487df2c0a885b664fff4c54211d4fbbf7ec7b3d1187f72e493648b1e1e79035d02df635b31c692f13d9b088fdc3895bc64da0ceb4ee9ddf23ab9fefe1d4d605ddaa1356df11070ca611b4c96a87ce718e113b6df88aef991108f9e2a3442ecc460b21c8e3d58447d993a1b84770abe672275b22e1c3b6eb547874283c16a3299b362a35b3fe35690a7c805617f5d7ca2ed2cfe620caae24d6d7730021e0bb6c3e2d42d94fd545964246641db54adfa5914282fda36031caea73e913f5c2cc1676fa137d3b19e9670ede7ff9e7872b357b3b2c9ee1b2d96e22a133484b767fb4758e9b167c0b705447fd48f535fdc7cb628192fedd11877eedbdf302109a7c156426ed0d1a85860317936b800ff94094ebced743aa23213dbdedf595f95c953d4ea4bf2e3d7e5ba3bdde41df162ec684241e90f39b178adf0a31d779dbef02b74523fa2b35d2bb4f6e6934ce762e2e9835fd588d3c604e8b1a7b49e7317a9fda317017428c6d5f658d010b7ddae25abcf695dc04101c674b1e6311285958eae07d3baa80f112d8e5eba7a4a35f20099eb9ed1428c3de89861de62e342715799704194730b2915b3ac12ac99a97d947325f797aab4167c43054029eb3c06cfc4f1cc69e3feeba70c657e47886e47b1d9f3652f90bf27cf4407b03c52509e610d9cfd3719dca5b021867d7d419e525ad12d193e78cd328ceb7b01f084ca39a0c52dfb3ae33b40705e58ad9a5489252b4a64f21c3e213d5d0e6721107c47dd69790b776c1abc5ec47bfae041cee3a212979561dbcda70b48f87306e5c1587a07cc4d8f1b22aea05c8a4d76a04d3105d77d517171261dbed54901fe83050ad920aa31f1429621597c69e8a66d06b04813597c7acae29c9839ca99bd6b2ed656a182aeaeccb8f20794b7b25cfeb0febe3b4b02d1d095e6f8ef2fb918a9685783526e748cd44f33acbeb3097d2af99bbf68608a8408740bba12a6c43ba0c6ddfc6a68d3e81425d81c5ae9dc4f6bae6236c526f7778e97f02a5a6c43ecc0db49c87a4b9d66188ad0928e5febdfb59dd1ae1b13eab9eb992677980d8efdbd7f5f9a091ec40136c366219bf11fd153dbd96833f9e9561b05194e5d2ef5874ed9a0b5f692ba1639ffffcfc3ddfc4f10bef4ca80c13cbe314a35d9f5b6961e24d6864bad69f07f13339e6e109d684796392124e6bde466bf08f3b7184b662ca6d146e8d73dbfc05242de662f06b238a684049ed27f572f658d48636d4848b80fbc9c799bf843c86dbeca725265987ddb5c81b2cef3c487ae067a7ab5955acfd49c7ffee9af9d428493f302bde6164c6580db4a7cd5be4a15a8154895605ace1b9e1135bd1b779c08313ad1b06b86e4f38e75039829d231a865279e911cd01d61f143f0d4cd0aa21f8db92db8a916ce2706cd5a5255ea7ea894c8b93af02e5eb2f81f29478b558f3cf6b23c3b44102b9766fcf41d3f166babfad9e264914139cc8fd2a93d35c6533a19f0c04ab2ad3d0fad11529fe9f7e9a6e917bf03db8e28a1714d65c82dbe63d81dffe60b8c34135fc338d12cca732ee7e0761b598b9f68cc5072d1fa04b92f59fa49740560f90071300672234c2fdc0e83703b748627d2b4ee616e07dde6b33a21ec0cdf68389a86e36ebf01215a2f8614ba137ac56c7e4f23c6997f0c72efaa5cb6c705030c0b0d15a2476c4b211e689252c85bbfd4a9516059fbe4aed700e0470181a27e16c7c4dbe6349f2986327e94c9649c4a28e213c9d5269636c8aefaaa7ccc464379dede50bf7f3be79edb47f676a84d71c1b0368e8a2fb8d6e2becdec41776c347d59585eb77789d21f6df338b0c4e30f8fc0f27553575ce1173a81741734cc40d0ace82eb697d024ad44eb3a444b3c9eaf6e1859759bae2d401064877ba60effab43c6732f6879b2d7a9fcfe9597f38a79e192bf6d31ffe0dbb9e24e12021c695ce334a5c8b6cbe36ad4346338a692faf837da21f5fd04dd6259dbfe43440960c54881a9b8e22f349c180d600bd1c375866d711d3f0c2901906d632482daa0d30d02b76058bd57637321f8ae13df126b3fb2dc43fe79852c1b7351470871df1df88b3d65ff3c6b4bde3c8e28ba7ed9eb3616846145822ce2f1e3f149172bda34c7f43e958c941a6ace76a565252251a1134e6b4e5f992ed92a137f4b09348e63ce274111d8f7056710f866d324d6e7c6f288f769846483016e179f3e1a613069e4734f7778fb712f12cf9fb902a851ac5e329e3c1f9b54dad6bcd29467fcf4436cd664e5a3d7f198abf8b53d30a6963d4e6e4be5ac66e3df4214a0af2ac0dc03b611588fa37a71164c77a4cc2076a35d932973174ef5ec923694ee25338369303807e4fb8485d6fcc71932f3bd572f978976c9df0f710fed9864360d56075df788d630a9fe5bd6ac20784dd93fdc56304bc9533a3242c20092cd1c421229400b6ba0f2d2b621c5a50819f6d1727d0806e0ad799ed4070a520f186e7a3589e70275cd09e31056a377028808ab5c81e146b30717f53efba09d5a68d36c3c2a356dac10540d95bbe45fe792b5c2036", 0x1000}], 0x5, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, r2}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x38, 0x40}, 0x24004080) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:07 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000020000", @ANYRES32, @ANYBLOB="00cf4220e5"]) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x0, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) socket$nl_route(0x10, 0x3, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40091}, 0x4040004) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x44}}, 0x0) 00:12:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x0, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0xe00000000000000) [ 727.147123][T27964] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:07 executing program 0: syz_open_dev$media(&(0x7f0000000200), 0xffffffffffffff36, 0x32000) statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 3: r0 = getpid() syz_open_procfs$userns(r0, 0x0) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async) statx(r1, &(0x7f0000002280)='./file0\x00', 0x100, 0x8, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000040)="7d8621acdd13638740fcbebc9edefb3bb98d4fee4a1fd14bab5af622d6fe027facaf2b6546b004bf0660252a3588bfc8a5340bc4bc09a586cd193495b4199a6a361ededa6be87a71fd2c3ceef32df2710631a52c4f1823d909477382e28292310f92e2586e94e17d49e2ae5a41969666fcc8066c350d858842babf9c06a3c4205d98b56ac1f2effd37a190561c7b51dd0a6c860829013bd5b8117bb1b57f135d626e4923e343413df0a048024331eacd5604d7864e8d4a2b662d3c884c2bfb9af5f36636d5f9e9684ef98b49336c26a87648b4f5974851075812db8a", 0xdc}, {&(0x7f0000000140)="e83ef37405be163a34dcedf763561006471927f95a24e9037da8bfdedbe1246737081293c190718c9e067afb93571151966cf8b14fbd951b45a37b44167cb948a6c2dff2962e9c717582376982cfef6c06b1222711c01fc28bda28f11f681eaa48ce09eec6c256013f8b7f1780b0bc2f2268ff4f792c4635dadc8463b02d2ea90a414c5101d04f1f015a2ba1a528968ba68db829739bd6c0e95e7f81c05eb8fcd60642ede3e1b7c1881ea409225dbaf53c3c0166eaf2f39ed170e3c95a8bffe2e73a9be2a837fb92fd7951edcbeceb650489f37adf18c455839eaae481e3b5cfea876252c1ba5f95756121df2261beaa0b256805dbbf857d5f72a71a9af05a45fdf4ddb8b33874b5b36e27459ccd23d0bc3da060eb91b51e2facf3c8760b6d919fa7a53922d87ec60aff1809c7062fe2c53def4e9dd512133a2ed21507d0ba0367235882958e6df6e584087c5dd604b666ccb43bcb6e91eac073b5744139a3535c8b2ba02c37c8fcd3bb5c75b83c9c6036b99321326f1ecd43cdb9e5d8a78f98aca88aac2c8d90ce75d69a40028f28696397913b9b20a19bca5c504e78a32b163756b91e70249f96c64984a9b6481e81a20a1107aaed863e8ea25339be3cf7252c5a1bdbd1d26d649cfdacd1bd877e71e818e0c731c15ad49c45edd3d04e7f1c75976b4be874fa429f664c0426177a1bcbb28ecf87cf3fe8d72f21bde5c525de08a3dad2c6ceae83b40103fe37154237506a7be6e1b574496ec5e9d9fb1be080322b86c3442ed2f30ed0f4f50ba7f63be7a47f2b88b022aa2d373ba056f202cad7b8a3262497bf7b6134ba1c4973f6637ab0d84e19dee0744ff85f93683bd3ecf45a40b9fae2a9c5c7ad6a19ca5140ea6d848586c4163b46a5939a3756dca4d468494c54b1a4fcbdd4bec84d3de9f82604a459da69c2a8d571f11bb1bdbcd8ce2c4389286a3792161d02c6d21e670f32c8597dcade90e72a70ee3aa411d4f3664fabf9d8c900eec6c90eb9d4ea7a6b1a8e2ca995071808484120615dffeb3188b3346ae29881e05b2ec8e692fc67d925a92ec1dfe7bf34e3a01ee70d63df1350210ea071b03f90c8077c39431ba0bb611b090ac5c5ba6c80f398ca5e8a37f72972eb4c241ddc4871c3bfb2b4c6e681e50926a566dc09835691b9b575d9c176e0c249f740e5e845980c4f175e01149d0def3fbd7fe5aa141eee094f540da3b9f45858688b868d9493e2763efc608b0b902994bb2b4aaf01d871ba76e02438e2df9212bea85e43dd4545bd9c613e85bf69115897ea2ac4b737eca7d4cf1df8ed60495c26ef68d6b88e597a6d7987c1723f9ae07e5596fb225289d376070bc1bb6cbdf3faa902a78cbbe6cd64f3e0ae352920e2cc2c47e8ce329382f3917b791217c218d8d62298e77d1fdb6164ec2755951f446f0602391dabb87e165f35287d117b634c31048756fa2d24c89d568160b55b33154a5f377e1f6b5bb6f77f12c5e7bc36e5dc98331e087da06a87e608a8e04252b27ee677b0e4b6b09383034502f67c75728edad74b23bcdebddb8d53dd429350197f0f25d11dc72d0dfd2427f3a6b1ca11844d942dc91ff108866a4fdb095ed33e4a41fbd70258cb503917410c3ebbb058ff5a1da30fa866af82881a73ca83113d465881ee0a7d805ef25440509622b57fbb81e940196ba6c31e43145b671121ab40ce494b0787b90dd6b45bae6799db9978383fc0e900f4ed41594bac28f0437abfc03ded324e8004bacf84839d726d377ed044a6a2f15cd0307b73a017bc1cf24198cb6e586f3a8d1e20c5f581d8a96cd93d95503aad7e5134c7455a456bf92e2bc1ebb2c7e968c8d97249e7af61540bdf4b4efe472d242fa071eb2d541366ccedf5a07b5f29dffe697317915c14ac344bffc7d3dead9d428febdd6aac253d55594e0ebaeb41a3eb20bba1a4ff5133c2cabf9feed9990071289ddf890fafbc90d73eba142162ea4f92bd61794ef4abf85c26896c9ac10b8016209827156461163508de7335c85ddc8944fffb35147a52232e9d19fa5a95df5f07f24d40d6df34646596072e23bbfad0c2fc09b3bf79ad32ce62dd2d7ec5b56e62c0ebd8fc5507e428391832a477d511793c2b3f3baeebd9029d8333efeae242408eed95f609576143887b9249c62cee2868d4e974e30b5b185059c8d2dcb315e09304906256ff03d560e7da0e24865cf682b1183965a230d24ea698944d5ba888a77308922e8053c8198092ca20b6ab1a8402ef6cec3cee85dc1d9a3b8a43eb90c9acb0a084b237851c728c5dc4fc78b868eee610726f59e0a408e70f094141a21c57ff32677d21023dbf59344ff8f13b63c745469598280a5dc292c2cc72359b6642bca0a729dfd4d76d234a558f835b238fa38bd6eff00c53013013863969dc21428e862df9624800bae12867920387fb98ff0ae86481f9936027202c4164209d066787fec4ee2da56436f9ceffcdb06efea68855546101cc49c09954fa5e2cec06af5079f4445bf0a800b44edd378390250f4a75c5d94b83a2e7380ce46f0284d0e50b1f23d9a56358e181dfb367718ffb9e6bfccf37439549e8cffb65dfa8a3aba15bb424636dc080f41999072a2d0c45e575caad51976ebb72ee9a51321fba9bbe0b5f2dd5b9f3348dd5c9a964b0864b855a0d5ef0ccd557200aaef9c3be12ae59df3e9e3145926bf250d8e3b38a8accb8543d47c96f0084ec7e64f069dc68b7daab12828dc885bcec71c135e54d2cc25669d5f229a6a7b61bc08de47a60c6d0b5e1e1303dffc73f42d3fea7f50b802094c248f8b80237d954e2998f2fe3100a48bb9abfa23c0db4c2116fbeffc69aebfa13805aea779a4026417ae41f66d78462089e8b5d3f7501111e75dd3e5e27221a29a39c23e175eb029693aee529d1d0fbef7fda2a6f52b1c5a233dda76c0b37905fb851f13c8291d7a6374e15275c67f7f373e0f8705bc8ee60a50ddf1cd4e2e64f478d2700f0f370dffcdc47b91aa13befcc2cf0d9130105381a88799bf3a410a117bb462613bb076988df8af7b416addc59103351b4b06645910bef466f2ae8bf826e7080ec2b003fab816c5bfd925ee6d5900fe2f0924e0d350f0aedde5724c6e8000769e620f876b5acc6affadc62db1c0d7846193413dfbd059de34fade027513b10e208af4f4c15404911628052fb406afaf5c1900da3da8aca93aa5551dd54c2caffff9f778e83a5596508568ca23c5f2ec1e5bd8b7bd1fe4042f57b0f39f78f97b140a5149857dfb95fa0b6a9482305e5239c561369289635e0c2d0dae35401d3bdd07ad2f1e498fe447273bf8f23a77f97a1b98ba6a504fe832603ef4d48d4e2c4b91b61425a0339cb22833360448be818a9f1a7bfbd345fd8df2aecb1b4a677747bfa3a121d8a8bfe6bd9af2fc5f161aa7ef43de71cf05019f25382a9ab9053c99a9d8061aa71b493f111869ce3e5db3000e1459947d6ae78a0e307299326287d9e6381e95e672ec4899d6384f4bdbafb9e73f5c220195d4cfa7f37703a0cda4d9d3a3fc2d980c3af92a98c1ec58280a34dfaff272fc8cbd3dd1ad5904209dafb7aad0f71944466324b8401635fe18b4fbceb1138c469f385285fc062956505d677007e18604b5f0612aa5df169358e5ef0837913404cea3a7f3479f240dc071cfcf039acf9587945eb0a8c75a3f63de072928b42b0e35e99306d873fe90e1f19d8c8fa058ac46ad507890b8ed8a51457c5cb3ad61f986161ee3dadd6fc676d5d03ab873a6da25d30a8db1a6c8bde16ca26419d6defc4f69735fc386881b72de43b569a75353218ac81ea46f58aa401ae9189fd256e898d8875d861cd2a0be6cc2371c041758f90c91adcd2d45584003b7ea39c9c71d8032168993f7a403be3cdb7a5dd7ea1ab111263a75b90806e5d8efe047fd0cdc8c633da7a680f8d36026dcf4d3aaaa89c23c9663c01aa2151ebcb8dc9ba44809e32458a704be963674b7170b562c7e58a18ee628b3bdc6f0dab1f0a8be03b1efe2faeb4f3d2ae2c7a18960e3fcf8e53895e4dbbd230b95c3bd2c8ad0a941337c4eb239b3ce8e0386df63c80ea210fe70a4967f0bd10c39e18cf04d66344cc03cb07605017c2031e705754fcd96492b6d9f802189885d1dbe28a09b41615b0d1a283200183be6e6d5e9ce644f8328105ee09690bf58b5b0f004ece9dc7fc407a33b53fb071388eca6c68bbcaf2cb5828a855b00ca838a65812238fbdca307e75d5676ff4078d877accf87b35b8b5b926fcd66ffa18c9056ba1e562c2f48cfa6ff1c40465e5510721d437f82c7e652a41815cb84560174cf56966034e14e781805615c4ac6d6595d149cf8a2e0fb219acaf63bce3edf440a71e62e9e5667783e143d7136d9afb76e9495b4959494db9bce2adc15840119730ac1d65910d67ff571e5d3b67906273c337364c76bd7b28589df737a89c9f47c1c4bdb3289223e579db8f72c7b020a529a4ef4705557ca51862d21a0bad082c39accf48d876eca4dfa0147737918ac6ade3ff87faedc30f084ae86f2b8df96265aa3f0e78cf3ae36564873ad69234756a2f19269798cc8705e509bdc8bb001134dec32d8604c9eaf08a0944eeb97f350dc670263b45059d20d3050f4a0e73186691961ebcd326a57e1d930c6b33804abc998521b95d6ac22c889e46eeabdadbab2282c9812aa3d4b4cf0ad190a62e4157db358a750f555c1010202fa07f42bb19d1844e2dcaab23f2afd0cc552368357b8bec198fc2e4192ef2553abac92a7be447d85a4dd91a1b828215873bc0509ecd3319ecb3cbb70f9c7ae7c478693b83c5af02c3153102fcc78ae381a7f48603ae0c352d688a5a087091c9f2fd038c90b3d5c3f9d3e6909aa34711860ddd5c34a65143dd87a704402e3dedcf4a674be7017fabad918e01fad3f46e83ab136d31cf5ce7c0f999df22edafcc78f8e655d38d3a33f08adb64d0520c455ad58bbe1e818b32c007eb967fc3e88d22dd748a5b1898cf243d51f5d640a4f30792097de0770277da17ef542c9488869e01f78f904b0b6822e8b59de4f6e2c74eb7273aa44813dd4dbb4d82cc7c0a801679c94d87537a6bf255a68dcb31778014372d06bd87124cba07e384d220c91ecbe41f28d4d661eeae0e1bbc540af3f6ba200cd04b501c4004d8b3035c9cde3a5ae8520d4507343768019b4c3866b13e9431defe0ccd943930d3c74aaeab2a47c66f9c342e2211f61a94e00d3b4b48a4378cf87975d90f1f1d4320a04c7d500869c71f748de1c4b7d4eaefa75b5e8c795560acda0e1e37cc226a0db75998ca2b17204b5b2ff58c0f0f531c7f58fd7c219428188c7f777c81394506807c3325275007deb7f8cb50d40a37f48f7520d760c4b3673a383e1720c9120061fd2128131f948b6be28bb711efaa51d2ba911cc25d31366cf9bf6432ffbab53da3c9ffa08f09b8386e820b41645285377357864e6ed0f9fe5a4dc4a1a6375b44ae9e3787ca22aa466d4e1e30098d2d8802efb4d58aff656ae56d5c82a70b78dee8dca839e566fbe77c6ed3e5c22f7c87b82ba7b0cb01169364203dbfac7756f75d4986e0de14749918dd52e367fb7eeb3d5e7cf69dead7d1b0b90e2a85dd79f93b2da1825f01b7745dbcb2696df65e3c22cf92d8442a17bd42c0fbb16aa0a2fe43d64650f1be9b309fbd21fbe2536c097ee47b4cd30ca64f0a3c2bba789aad25efe9c76f1e97b4a840543b765520d6a123c344ab342e64135e490e2e5cb23b34bdb30ea7aa2cfe4e3cb8eac5b15813fb34f290acbf3202bd", 0x1000}, {&(0x7f0000001140)="780a898973bf695d94bb438609fa33f355bcda1f8590b00f59751bc8d6b9fab5cc484fe904fb5ce4a82be25a5416f31ce9def82d318452923e1ad4a08bbe6fc5f947f9e25a1d8a7653d7818ef5b5f0d57e6b5da95dd4cba3f7f10ca0a02f8f4b20a10fb14904c2abbd29944e9de7df8b3015", 0x72}, {&(0x7f00000011c0)="29d5c99a170c1b31212a2a0dea4a7f510c067d48dbbc12aba711a7bc39a199cd042e", 0x22}, {&(0x7f0000001200)="6bd103c479fcb74120fabad8010aedc096375dc577f863b205eddb65f515da82cfbda8fd34f751ceaa9e1bb5a92c42bb6f41d4711b32464f58a7e971388efffc17102a824f7358ba76c0231e74cbae7353a3f1f52200e3184b5a97934a2c630757060d6d73840c2fbe0f6d93ff1da8cc0a8d32b3c74e82cc2708e2713c8bf2bcd3d0058077b52d9bc35a9bb8b5d7606154d3c1a10acec0033ddf5f25d3bca85b931d93922e13e6fbdf592a53ad65b2d3a63f82167681b5a499cb9ceb394dd3840ded87b51a22d439209a4c27d46b3300a9440f233bd1b072264724a08a111a8e2293a9eaac8032687096b2c1615c94bdc253887f3f5a349a18d38240c0dc07474126f71803944fc7b27f82a9ac6809c29e534d71975fbee6bea8b2e580b1d5efd72a9c7d0337a4db09fd4a24ecd5f4eff669d58650175e4d4d95db7932a0c92c9340f18e7f46b723c852e31612bbee00b48c6ee734b8e04f18b2e3f2b14d0fd98a11e5b2f1d46b84bb4a9e6dd99a1e22a387a6cb8e6f665f9cc88e520f4cf1b4725a976edf82c61c7a4cf8cc39acaa89717c105abbed0a4d71647e5efd610b8ec567310ab0382a733f719c12337b67d55ae2594b7cf3c43e0fda8e1de35924e4d6647ac189ee8b3e2d0c8b0649cd08170a17e7bba970deae58a62afc362de04fc97ffe09d8081aff5c2b428085323cfce977aa9d07955f2a95a21b0553a077695d4d11f74439a22d7d72f00db713b488d536dce8ee82ffac7010544d4da35915623e83ddbdb800ce9707ac74913edb6a3e75127b09334cf7e02b271fee86ed000a278affb15d01a9cc9ea2e1f77a7b853f3fe703353c7f59bd9556123a6e5e5ad2b750e8e4ecfa014ad28be4fc9e0ea610e7d75daa5586717196af9383b41ceee04b85dbc3e03d11fdb77d377e510860f547cbb3a125d11fc463bd305a38a8c19a9bfe60cd14a8800e9583f22aacd45f31b65c540b945176ced705e73f9683bedb684fcccf8823834e7d6e8d3b8b252f72081742100cbab2460f7ec7913b89dce810975e70d60ba109f45fe0d3978f35228a2108d8990c57debb50163d2e8dd01a7c09d8b0ed903f84c0f5c86b05741da8e0648778f9dd3bf9195e295a8b97c1765decf60ac2bc2046bd3728b881a4035a7161bfae6d2b2715bca83685acccfefde75fbefc3c9bbd8e93ec897c8344b05392a6c95ae5f71a7c4edf62befec1bdac3758eb98840332d83f3f037a4330fcae1f28e847a3d2b9aafdb80b96d28ee5d1ac65da944f308f6fbbba9c6977a31357b5d1d5f2212d8aa7d831afd7477e9ba0e7d54bf959499a71a77ad0eb49395d4d08833319ae64c133f187343f3a855f7017694e2876180dc06c45de815db926468233de3c36e8bf4bddcf7dda2c4098890a77f6c5d62834ff3fdcb7733bc5fb58f96b534c7b247d0687535d41df25559c5495d241030c4cc97bce8391a403e8b273c786cc752ca01912ddd92290ea4a8123a2ee7604370a488420a8f763a2a2d95e199566e97114c671b96e5699d06e83587b3ac8c86c8752573d2e69c2a9b575a88467535c67305faa98402af3eca1fd658aeb03fd13758d6d5b9676728797f3881f466e983074422d8c8da7d459933b31fde5a048716ac156714a49723dcc5ae3286f0de14610bb97dba9235777ad3be1b58232f4cbfa2949ba292a53cdbddb88ea0b8779b2062fc8bab43e49a30b149ef0671f13b0ae94bed684d34de19647477513a3afe889a37000c8939e4c9971cb5df6bf7947e677c9154ecee28c35df55bd191c97f6ed98bc6f36f01cfd5f9657593868f5fc3212897a7e09153e570cf9a8a0669379da23ce620d1a1463df500240970feff87b1d87a0186547bf5c529866b2fa31b77e1ac64cb2e4803f8bb370bd8a6b728b7b0925518c05e6cef3f8a46154d4d5204b43a26e7a5cf793c3317f803554e49bebf0557203469e10958262ed02e4e0380d8feb97b6220d34fef5e07e29092ab877317956450f4cd8b3049df1ab53cc6f8626698df7f616703bb4baa225aba89ed5a3a721582c6707cb40e2ab10682a0e484808ab7828ec1079f43374838f8bab8b466fcc35f86e46512b3d87380af2cd5aab4cca6c576133b243ac210a62d33e58455e0c693f36b2a34f43a15018ec04eebea979ed964c7e2d1cb5a1b67366316895128c5b802a7a4b681a8a72e7ccb630239abebab88f74ae6e7547d1177ea13a4768ade46bd33baa6184e17ccdf7af4458ed057a44a5e04967ca8f2b882366b6bef77ec0eda97b98841ec409058fef91025c82926b2b3b6a478e76a357e021e9c71126001f5fdf4636f9054daa8185b5fecd2e959331e892b8245063071ceb8191af948e1ac5b00d5c0e75e5127b3f7fe9ebe8acdedfba5b0b80d7b974bf53c1de6497f6ba9fcbe6e33921f68112d8fe7f3be84b4c18090531cacdae0d7c9f9bb5a49f21ebaf840401137ae21bc000eeb9d3fd730a52018183292328807c5c8eb11d9713df952e8d966c1b2feba8e3f9ef21072fc1b7e4ed8505c6d444e3e72d3879d2a341640959b507c0282f256d61304fc6cba523358ee95881aa86987b4aeefa1f91079a26bbf6e488ea80000844aa47314083b76dad75bf7ba0f615dd270d6d3cd35dd0dac09f24e3acc37e10fe722d2e6fddeb0912efdd572cff02c2011b7dda8ca8aa824764f02edd37d1bb45b72a1f4015833f30487790143ca3fca23d9ee593dd538e3b2b1fd64b94be9b0648de61780f5950637d1998e1579df648a53a77ed92add3b3006dd4ac8f940b96644ddef4ee4e63fd65646e76db1dfdc953f23f2ee95dad8b671ecdb28e46892f874d5ac12f1fae79e5803c830dd43832670f180cc0e205061f74d576f4ef0283f83f158d2a4fd0e2473891c7d78a7e87a1107a3497c88224cf31152fff532b2f36e3f2fa8f51ddfe8d2a8a50b4dbb1b3d1fd84bf39eb7561cc71918c9c53f22697b86776f33a4c696818eeeabdbf584ea3b6b17077355bbdf0170f948dfa049cd0865ad220dbfef77540da5613f4e7a510ff89ae995736712c7a503ff8b532e59cda37931c1d58f1bdacc2465cd80b03ae640e8a14502da0b52af35e0bece7549042192a39bd9cf505bb4b5f6efa7459fdc69e4f228bf2d48242239e71472ff9a528cde318ce181b4177102b8db07ed3a88a4dfe53cd9499f66ab119f760d2fc968287d35fd1ef66afb782d4cf7ac71bde1bdb7487df2c0a885b664fff4c54211d4fbbf7ec7b3d1187f72e493648b1e1e79035d02df635b31c692f13d9b088fdc3895bc64da0ceb4ee9ddf23ab9fefe1d4d605ddaa1356df11070ca611b4c96a87ce718e113b6df88aef991108f9e2a3442ecc460b21c8e3d58447d993a1b84770abe672275b22e1c3b6eb547874283c16a3299b362a35b3fe35690a7c805617f5d7ca2ed2cfe620caae24d6d7730021e0bb6c3e2d42d94fd545964246641db54adfa5914282fda36031caea73e913f5c2cc1676fa137d3b19e9670ede7ff9e7872b357b3b2c9ee1b2d96e22a133484b767fb4758e9b167c0b705447fd48f535fdc7cb628192fedd11877eedbdf302109a7c156426ed0d1a85860317936b800ff94094ebced743aa23213dbdedf595f95c953d4ea4bf2e3d7e5ba3bdde41df162ec684241e90f39b178adf0a31d779dbef02b74523fa2b35d2bb4f6e6934ce762e2e9835fd588d3c604e8b1a7b49e7317a9fda317017428c6d5f658d010b7ddae25abcf695dc04101c674b1e6311285958eae07d3baa80f112d8e5eba7a4a35f20099eb9ed1428c3de89861de62e342715799704194730b2915b3ac12ac99a97d947325f797aab4167c43054029eb3c06cfc4f1cc69e3feeba70c657e47886e47b1d9f3652f90bf27cf4407b03c52509e610d9cfd3719dca5b021867d7d419e525ad12d193e78cd328ceb7b01f084ca39a0c52dfb3ae33b40705e58ad9a5489252b4a64f21c3e213d5d0e6721107c47dd69790b776c1abc5ec47bfae041cee3a212979561dbcda70b48f87306e5c1587a07cc4d8f1b22aea05c8a4d76a04d3105d77d517171261dbed54901fe83050ad920aa31f1429621597c69e8a66d06b04813597c7acae29c9839ca99bd6b2ed656a182aeaeccb8f20794b7b25cfeb0febe3b4b02d1d095e6f8ef2fb918a9685783526e748cd44f33acbeb3097d2af99bbf68608a8408740bba12a6c43ba0c6ddfc6a68d3e81425d81c5ae9dc4f6bae6236c526f7778e97f02a5a6c43ecc0db49c87a4b9d66188ad0928e5febdfb59dd1ae1b13eab9eb992677980d8efdbd7f5f9a091ec40136c366219bf11fd153dbd96833f9e9561b05194e5d2ef5874ed9a0b5f692ba1639ffffcfc3ddfc4f10bef4ca80c13cbe314a35d9f5b6961e24d6864bad69f07f13339e6e109d684796392124e6bde466bf08f3b7184b662ca6d146e8d73dbfc05242de662f06b238a684049ed27f572f658d48636d4848b80fbc9c799bf843c86dbeca725265987ddb5c81b2cef3c487ae067a7ab5955acfd49c7ffee9af9d428493f302bde6164c6580db4a7cd5be4a15a8154895605ace1b9e1135bd1b779c08313ad1b06b86e4f38e75039829d231a865279e911cd01d61f143f0d4cd0aa21f8db92db8a916ce2706cd5a5255ea7ea894c8b93af02e5eb2f81f29478b558f3cf6b23c3b44102b9766fcf41d3f166babfad9e264914139cc8fd2a93d35c6533a19f0c04ab2ad3d0fad11529fe9f7e9a6e917bf03db8e28a1714d65c82dbe63d81dffe60b8c34135fc338d12cca732ee7e0761b598b9f68cc5072d1fa04b92f59fa49740560f90071300672234c2fdc0e83703b748627d2b4ee616e07dde6b33a21ec0cdf68389a86e36ebf01215a2f8614ba137ac56c7e4f23c6997f0c72efaa5cb6c705030c0b0d15a2476c4b211e689252c85bbfd4a9516059fbe4aed700e0470181a27e16c7c4dbe6349f2986327e94c9649c4a28e213c9d5269636c8aefaaa7ccc464379dede50bf7f3be79edb47f676a84d71c1b0368e8a2fb8d6e2becdec41776c347d59585eb77789d21f6df338b0c4e30f8fc0f27553575ce1173a81741734cc40d0ace82eb697d024ad44eb3a444b3c9eaf6e1859759bae2d401064877ba60effab43c6732f6879b2d7a9fcfe9597f38a79e192bf6d31ffe0dbb9e24e12021c695ce334a5c8b6cbe36ad4346338a692faf837da21f5fd04dd6259dbfe43440960c54881a9b8e22f349c180d600bd1c375866d711d3f0c2901906d632482daa0d30d02b76058bd57637321f8ae13df126b3fb2dc43fe79852c1b7351470871df1df88b3d65ff3c6b4bde3c8e28ba7ed9eb3616846145822ce2f1e3f149172bda34c7f43e958c941a6ace76a565252251a1134e6b4e5f992ed92a137f4b09348e63ce274111d8f7056710f866d324d6e7c6f288f769846483016e179f3e1a613069e4734f7778fb712f12cf9fb902a851ac5e329e3c1f9b54dad6bcd29467fcf4436cd664e5a3d7f198abf8b53d30a6963d4e6e4be5ac66e3df4214a0af2ac0dc03b611588fa37a71164c77a4cc2076a35d932973174ef5ec923694ee25338369303807e4fb8485d6fcc71932f3bd572f978976c9df0f710fed9864360d56075df788d630a9fe5bd6ac20784dd93fdc56304bc9533a3242c20092cd1c421229400b6ba0f2d2b621c5a50819f6d1727d0806e0ad799ed4070a520f186e7a3589e70275cd09e31056a377028808ab5c81e146b30717f53efba09d5a68d36c3c2a356dac10540d95bbe45fe792b5c2036", 0x1000}], 0x5, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, r2}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x38, 0x40}, 0x24004080) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40091}, 0x4040004) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x44}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) (async) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40091}, 0x4040004) (async) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x8000) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) (async) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00'}) (async) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x44}}, 0x0) (async) 00:12:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x0, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) setresgid(r0, 0xee00, 0xffffffffffffffff) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x0, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 0: statx(0xffffffffffffff9c, 0x0, 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) [ 727.283159][T27978] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) setresgid(r0, 0xee00, 0xffffffffffffffff) 00:12:07 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000080)) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x26, 0x3, 0x1, "1c64ff0e35bc11df3fc1a4361871ef8c", "e5e97045715bf612b998b931dfa699b3aa"}, 0x26, 0x0) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x0, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 0: statx(0xffffffffffffff9c, 0x0, 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40091}, 0x4040004) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040000}, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x44}}, 0x0) 00:12:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) setresgid(r0, 0xee00, 0xffffffffffffffff) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 727.330407][T27998] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_cmd_wq": -EINTR [ 727.404354][T28002] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:07 executing program 0: statx(0xffffffffffffff9c, 0x0, 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x4040000000000000) 00:12:07 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') setresgid(0x0, 0xee00, 0xffffffffffffffff) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x15}, @ringbuf_query, @ldst={0x1, 0x2, 0x1, 0x0, 0xa, 0xfffffffffffffffe, 0x10}, @call={0x85, 0x0, 0x0, 0xc2}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x8, 0xb, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x3, 0x4, 0xd}, {0x5, 0x1, 0x2, 0xc}, {0x3, 0x1, 0x3, 0xc}, {0x3, 0x2, 0x5, 0x4}, {0x5, 0x3, 0x2, 0x7}, {0x0, 0x4, 0xa}, {0x5, 0x2, 0x6, 0x9}], 0x10, 0x7b0600}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={0xffffffffffffffff, r1}) 00:12:07 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000080)) (async) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x26, 0x3, 0x1, "1c64ff0e35bc11df3fc1a4361871ef8c", "e5e97045715bf612b998b931dfa699b3aa"}, 0x26, 0x0) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 1: setresgid(0x0, 0xee00, 0xffffffffffffffff) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x15}, @ringbuf_query, @ldst={0x1, 0x2, 0x1, 0x0, 0xa, 0xfffffffffffffffe, 0x10}, @call={0x85, 0x0, 0x0, 0xc2}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x8, 0xb, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x3, 0x4, 0xd}, {0x5, 0x1, 0x2, 0xc}, {0x3, 0x1, 0x3, 0xc}, {0x3, 0x2, 0x5, 0x4}, {0x5, 0x3, 0x2, 0x7}, {0x0, 0x4, 0xa}, {0x5, 0x2, 0x6, 0x9}], 0x10, 0x7b0600}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={0xffffffffffffffff, r1}) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={0xffffffffffffffff, r1}) 00:12:07 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x4040000000000000) 00:12:07 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x15}, @ringbuf_query, @ldst={0x1, 0x2, 0x1, 0x0, 0xa, 0xfffffffffffffffe, 0x10}, @call={0x85, 0x0, 0x0, 0xc2}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x8, 0xb, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x3, 0x4, 0xd}, {0x5, 0x1, 0x2, 0xc}, {0x3, 0x1, 0x3, 0xc}, {0x3, 0x2, 0x5, 0x4}, {0x5, 0x3, 0x2, 0x7}, {0x0, 0x4, 0xa}, {0x5, 0x2, 0x6, 0x9}], 0x10, 0x7b0600}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={0xffffffffffffffff, r1}) 00:12:07 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000080)) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x26, 0x3, 0x1, "1c64ff0e35bc11df3fc1a4361871ef8c", "e5e97045715bf612b998b931dfa699b3aa"}, 0x26, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000080)) (async) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x26, 0x3, 0x1, "1c64ff0e35bc11df3fc1a4361871ef8c", "e5e97045715bf612b998b931dfa699b3aa"}, 0x26, 0x0) (async) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000000)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x15}, @ringbuf_query, @ldst={0x1, 0x2, 0x1, 0x0, 0xa, 0xfffffffffffffffe, 0x10}, @call={0x85, 0x0, 0x0, 0xc2}, @map_fd={0x18, 0xa, 0x1, 0x0, 0x1}], &(0x7f0000000080)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x8, 0xb, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], &(0x7f0000000180)=[{0x0, 0x3, 0x4, 0xd}, {0x5, 0x1, 0x2, 0xc}, {0x3, 0x1, 0x3, 0xc}, {0x3, 0x2, 0x5, 0x4}, {0x5, 0x3, 0x2, 0x7}, {0x0, 0x4, 0xa}, {0x5, 0x2, 0x6, 0x9}], 0x10, 0x7b0600}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={0xffffffffffffffff, r1}) 00:12:07 executing program 4: statx(0xffffffffffffff9c, 0x0, 0x1000, 0x200, &(0x7f00000005c0)) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000080)) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x26, 0x3, 0x1, "1c64ff0e35bc11df3fc1a4361871ef8c", "e5e97045715bf612b998b931dfa699b3aa"}, 0x26, 0x0) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000140)=[{0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) [ 727.716564][T28076] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_tx_wq": -EINTR 00:12:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x0, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x3f, &(0x7f0000000100)=0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002b80)={'vcan0\x00', 0x0}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r4, 0x2, {0x2, 0xf, 0x1}, 0x96095793bec2d596}, 0x18) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x8, 0x40, 0x7, 0x6, 0x81, 0x8d, 0x41, 0x5, 0x3, [0x94, 0x8001, 0x1ff, 0x1, 0x3, 0x4, 0x8, 0xe24], [0xfff, 0x8, 0x1, 0x7, 0x1, 0x80000001, 0x0]}}) sendmsg$unix(r0, 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x0) 00:12:07 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xafae, 0x8, 0x40, 0x2, 0x1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x4, 0xd}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r3, 0x80047c05, &(0x7f0000000080)) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000b80)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000f1f8ffff696c6506729dc229cb593000"]) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b40)={{r2}, &(0x7f0000000ac0), &(0x7f0000000b00)='%pI4 \x00'}, 0x20) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x1c, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x0, 0xc, 0x1, 0x3, 0xfffffffffffffff4, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @exit, @jmp={0x5, 0x1, 0x0, 0x5, 0x8, 0x20, 0x1}, @generic={0x4, 0x3, 0x8, 0x9, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map_fd={0x18, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000640)='GPL\x00', 0x5, 0x59, &(0x7f0000000680)=""/89, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0xb, 0x9, 0x8060}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x10, 0x5}, 0x90) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) write$yama_ptrace_scope(r5, &(0x7f0000000780)='2\x00', 0x2) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r3) sendmsg$IEEE802154_SCAN_REQ(r3, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r6, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) r7 = shmget(0x3, 0x3000, 0x4, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r7, 0x0) shmctl$IPC_RMID(r7, 0x0) shmctl$SHM_STAT(r7, 0xd, &(0x7f00000009c0)=""/148) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000c0}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r6, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008800}, 0x4008) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000a80)={r5}) recvmsg$kcm(r9, &(0x7f0000001080)={&(0x7f0000000880)=@alg, 0x80, &(0x7f0000001000)=[{&(0x7f0000000c80)=""/109, 0x6d}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000d00)}, {&(0x7f0000000d40)=""/207, 0xcf}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000000e40)=""/125, 0x7d}, {&(0x7f0000000ec0)}, {&(0x7f0000000f00)=""/250, 0xfa}], 0x8}, 0x2000) sendto$unix(r9, &(0x7f0000000bc0)="a3aa84e0d70efdbb", 0x8, 0x20000001, &(0x7f0000000c00)=@file={0x0, './file0\x00'}, 0x6e) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r8) sendmsg$IEEE802154_LLSEC_DEL_KEY(r8, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r6, 0x8635e2db31a60490, 0x70bd25, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004884}, 0x4008000) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x110, 0x2) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x0, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) [ 727.732616][T28092] workqueue: Failed to create a rescuer kthread for wq "nfc5_nci_cmd_wq": -EINTR [ 727.870677][T28121] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x0, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000ec0)={0x240, 0x80, 0x12}, 0x18) 00:12:07 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x600000000000000) 00:12:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x0, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:07 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xafae, 0x8, 0x40, 0x2, 0x1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x4, 0xd}, 0x48) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r3, 0x80047c05, &(0x7f0000000080)) 00:12:07 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) [ 728.036643][T28157] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0) 00:12:08 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async, rerun: 32) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (rerun: 32) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x3f, &(0x7f0000000100)=0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) (async) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002b80)={'vcan0\x00', 0x0}) (async) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r4, 0x2, {0x2, 0xf, 0x1}, 0x96095793bec2d596}, 0x18) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x8, 0x40, 0x7, 0x6, 0x81, 0x8d, 0x41, 0x5, 0x3, [0x94, 0x8001, 0x1ff, 0x1, 0x3, 0x4, 0x8, 0xe24], [0xfff, 0x8, 0x1, 0x7, 0x1, 0x80000001, 0x0]}}) sendmsg$unix(r0, 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x0) 00:12:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xafae, 0x8, 0x40, 0x2, 0x1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x4, 0xd}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r3, 0x80047c05, &(0x7f0000000080)) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) (async) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) (async) syz_open_dev$audion(0x0, 0x0, 0x0) (async) sendmsg$unix(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xafae, 0x8, 0x40, 0x2, 0x1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x4, 0xd}, 0x48) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) ioctl$MEDIA_IOC_REQUEST_ALLOC(r3, 0x80047c05, &(0x7f0000000080)) (async) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x0, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x300000000000000) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x0, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', 0x0, 0x0) [ 728.221768][T28180] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:08 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x300000000000000) 00:12:08 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x3f, &(0x7f0000000100)=0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002b80)={'vcan0\x00', 0x0}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r4, 0x2, {0x2, 0xf, 0x1}, 0x96095793bec2d596}, 0x18) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x8, 0x40, 0x7, 0x6, 0x81, 0x8d, 0x41, 0x5, 0x3, [0x94, 0x8001, 0x1ff, 0x1, 0x3, 0x4, 0x8, 0xe24], [0xfff, 0x8, 0x1, 0x7, 0x1, 0x80000001, 0x0]}}) sendmsg$unix(r0, 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x0) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x80, 0x12}, 0x18) 00:12:08 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x3f, &(0x7f0000000100)=0x4) (async) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002b80)={'vcan0\x00', 0x0}) r5 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r5, 0x0, 0x0) (async) bind$can_j1939(r5, &(0x7f0000000240)={0x1d, r4, 0x2, {0x2, 0xf, 0x1}, 0x96095793bec2d596}, 0x18) (async) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4c, 0x8, 0x40, 0x7, 0x6, 0x81, 0x8d, 0x41, 0x5, 0x3, [0x94, 0x8001, 0x1ff, 0x1, 0x3, 0x4, 0x8, 0xe24], [0xfff, 0x8, 0x1, 0x7, 0x1, 0x80000001, 0x0]}}) (async) sendmsg$unix(r0, 0x0, 0x0) (async) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x0) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x0, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)="1f337c39b502f856c4dc2a766233199744b799d677a5ed44a3271a484f0741f12ff2451efb24a3b66037c77b219d960b58ed7695ab8208f7640dc043ac6f1b1ec80a5a6b41", 0x45}, {&(0x7f00000000c0)="bfadf6734365a4d176a633516df572694d5d4e0892f933f08b1b13d6b7987e3db2afbe85109e", 0x26}, {&(0x7f0000000300)="38294bea6cc575883d43ea1e14695c4f4781a7dad5a9cbe5833015d24a58a4fcb05a3de9927109053556d5cafb02883f1752aa0a5ff591d657ea92c396d874be95e831d26cf7e737abab096373efd3d620f54ac918f8e5a1b3e2c4c59cdbba3f7cf3e028def7f5919572771f0dd3406380bb4c7e007bac3dcf37c3839fd8cc50009b4d07125dbd5ec382f802bed9888e3e438cad34a5f5b027e21983a7d8a0d35fcc7d0c746909c4bb", 0xa9}], 0x3, &(0x7f00000001c0)}, 0x4008801) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x80, 0x12}, 0x18) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x0, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x80, 0x12}, 0x18) 00:12:08 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)="1f337c39b502f856c4dc2a766233199744b799d677a5ed44a3271a484f0741f12ff2451efb24a3b66037c77b219d960b58ed7695ab8208f7640dc043ac6f1b1ec80a5a6b41", 0x45}, {&(0x7f00000000c0)="bfadf6734365a4d176a633516df572694d5d4e0892f933f08b1b13d6b7987e3db2afbe85109e", 0x26}, {&(0x7f0000000300)="38294bea6cc575883d43ea1e14695c4f4781a7dad5a9cbe5833015d24a58a4fcb05a3de9927109053556d5cafb02883f1752aa0a5ff591d657ea92c396d874be95e831d26cf7e737abab096373efd3d620f54ac918f8e5a1b3e2c4c59cdbba3f7cf3e028def7f5919572771f0dd3406380bb4c7e007bac3dcf37c3839fd8cc50009b4d07125dbd5ec382f802bed9888e3e438cad34a5f5b027e21983a7d8a0d35fcc7d0c746909c4bb", 0xa9}], 0x3, &(0x7f00000001c0)}, 0x4008801) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x0, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x300000000000000) 00:12:08 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)="1f337c39b502f856c4dc2a766233199744b799d677a5ed44a3271a484f0741f12ff2451efb24a3b66037c77b219d960b58ed7695ab8208f7640dc043ac6f1b1ec80a5a6b41", 0x45}, {&(0x7f00000000c0)="bfadf6734365a4d176a633516df572694d5d4e0892f933f08b1b13d6b7987e3db2afbe85109e", 0x26}, {&(0x7f0000000300)="38294bea6cc575883d43ea1e14695c4f4781a7dad5a9cbe5833015d24a58a4fcb05a3de9927109053556d5cafb02883f1752aa0a5ff591d657ea92c396d874be95e831d26cf7e737abab096373efd3d620f54ac918f8e5a1b3e2c4c59cdbba3f7cf3e028def7f5919572771f0dd3406380bb4c7e007bac3dcf37c3839fd8cc50009b4d07125dbd5ec382f802bed9888e3e438cad34a5f5b027e21983a7d8a0d35fcc7d0c746909c4bb", 0xa9}], 0x3, &(0x7f00000001c0)}, 0x4008801) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) 00:12:08 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x200000000000000) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240, 0x0, 0x12}, 0x18) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x0, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) 00:12:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48001}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000140)=""/90) 00:12:08 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0xd00000000000000) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 0: statx(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x240}, 0x18) 00:12:08 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48001}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000140)=""/90) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48001}, 0x10) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) (async) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000140)=""/90) (async) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) (async) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}], 0x10, 0x80000001}, 0x90) 00:12:08 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) 00:12:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:08 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0xffffa165c8a8) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}]}, 0x90) 00:12:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = timerfd_create(0x4, 0x800) r8 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r8, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r9, 0xc0189375, 0x0) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r10, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x80}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x40}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r11}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x20}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="8b7395d4bb5a6a6ee0fa99fcc254e6b54839761c3aa4342e322288678e03858361b3d23ab4dfbc7883f97a5250365a86db4a77dff0e8f2623d3a12ca2aeae819793040d0f7aab1d4b2a4d4b7cf11c53da52c045aed2a267b1e5f2fd4f3ac2449504b590ce77bacd1e403dfd40c85a042667046c079eba271d2a159760ffc8fb68ba7c727fdb27c8a9745a6547125e56f8958f7b986d8bcce40abf53f5a231bdc879ba05a92c397940b930060f5744b138b6c495ca4c782b1fada38d2c0dc0e579ce12d2d240c8679dedc1da3b75626d23df40ee345a40f897eb0ad5a1c3d8044e18ce4808dcb8ca19e470b035ccc11a87ff5c6cb", 0xf4}, {&(0x7f0000000180)="72be61627b456b3ba07756281560e0511331b47e962a", 0x16}, {&(0x7f00000001c0)="be2ec89b7f036f309ca3cd99bfe805781e6bbc000bae427535166b412a01f440a46a0ca7e70cd3b7c2c12e5bd01be5ad662216ee3512614fabc7b02a567373d3dc5e604d49e10781067bd815182b727ed1d764caaa1b6114a496b7228f66891f2519f200d21870d62a41314ef4a5f97b2c3822c75a00a6", 0x77}, {&(0x7f0000000240)="2d13732b93a45ca54abbc05f8b599645732fbccc042f864a2cc952e8dde776dc010ff04b919c0361a7cf767278675aa579d69ceb175d4bd99f6ad35a00407e9e702158211a3c188e", 0x48}, {0xffffffffffffffff}], 0x5, &(0x7f0000000600)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x1c, 0x1, 0x1, [r0, r7, r9]}}], 0x68}, 0x40041) 00:12:08 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getaddr={0x14, 0x16, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48001}, 0x10) (async, rerun: 32) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r1 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000140)=""/90) 00:12:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000140)=[{0x1, 0x1, 0x10, 0x8}, {0x1, 0x5, 0x9, 0x9}, {0x0, 0x5, 0x4, 0x6}, {0x1, 0x1, 0x6, 0x6}, {0x3, 0x5, 0x7, 0x9}, {0x0, 0x4, 0xa, 0xa}, {0x3, 0x1, 0x4, 0x6}]}, 0x90) 00:12:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = timerfd_create(0x4, 0x800) r8 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r8, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r9, 0xc0189375, 0x0) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r10, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x80}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x40}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r11}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x20}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="8b7395d4bb5a6a6ee0fa99fcc254e6b54839761c3aa4342e322288678e03858361b3d23ab4dfbc7883f97a5250365a86db4a77dff0e8f2623d3a12ca2aeae819793040d0f7aab1d4b2a4d4b7cf11c53da52c045aed2a267b1e5f2fd4f3ac2449504b590ce77bacd1e403dfd40c85a042667046c079eba271d2a159760ffc8fb68ba7c727fdb27c8a9745a6547125e56f8958f7b986d8bcce40abf53f5a231bdc879ba05a92c397940b930060f5744b138b6c495ca4c782b1fada38d2c0dc0e579ce12d2d240c8679dedc1da3b75626d23df40ee345a40f897eb0ad5a1c3d8044e18ce4808dcb8ca19e470b035ccc11a87ff5c6cb", 0xf4}, {&(0x7f0000000180)="72be61627b456b3ba07756281560e0511331b47e962a", 0x16}, {&(0x7f00000001c0)="be2ec89b7f036f309ca3cd99bfe805781e6bbc000bae427535166b412a01f440a46a0ca7e70cd3b7c2c12e5bd01be5ad662216ee3512614fabc7b02a567373d3dc5e604d49e10781067bd815182b727ed1d764caaa1b6114a496b7228f66891f2519f200d21870d62a41314ef4a5f97b2c3822c75a00a6", 0x77}, {&(0x7f0000000240)="2d13732b93a45ca54abbc05f8b599645732fbccc042f864a2cc952e8dde776dc010ff04b919c0361a7cf767278675aa579d69ceb175d4bd99f6ad35a00407e9e702158211a3c188e", 0x48}, {0xffffffffffffffff}], 0x5, &(0x7f0000000600)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x1c, 0x1, 0x1, [r0, r7, r9]}}], 0x68}, 0x40041) 00:12:08 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = memfd_create(&(0x7f0000000240)='ns/mnt\x00', 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)="523559176944dff8572cd046ce374974f98a9f2d30af6e9d762991311a20080a6144df273b07bd335954307bfab16f8b45b3845830f7", 0x36}], 0x1, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x30, 0x1, 0x1, [r0, r2, r1, r0, r3, r4, r1, r5]}}, @rights={{0x14, 0x1, 0x1, [r6]}}], 0x68, 0x4}, 0x20) mount_setattr(r2, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r1}}, 0x20) 00:12:08 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040)) (rerun: 32) 00:12:08 executing program 4: r0 = shmget(0x2, 0x3000, 0x20, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/84) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) 00:12:08 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x8a160000) 00:12:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = timerfd_create(0x4, 0x800) r8 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r8, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r9, 0xc0189375, 0x0) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r10, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x80}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x40}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r11}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x20}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)="8b7395d4bb5a6a6ee0fa99fcc254e6b54839761c3aa4342e322288678e03858361b3d23ab4dfbc7883f97a5250365a86db4a77dff0e8f2623d3a12ca2aeae819793040d0f7aab1d4b2a4d4b7cf11c53da52c045aed2a267b1e5f2fd4f3ac2449504b590ce77bacd1e403dfd40c85a042667046c079eba271d2a159760ffc8fb68ba7c727fdb27c8a9745a6547125e56f8958f7b986d8bcce40abf53f5a231bdc879ba05a92c397940b930060f5744b138b6c495ca4c782b1fada38d2c0dc0e579ce12d2d240c8679dedc1da3b75626d23df40ee345a40f897eb0ad5a1c3d8044e18ce4808dcb8ca19e470b035ccc11a87ff5c6cb", 0xf4}, {&(0x7f0000000180)="72be61627b456b3ba07756281560e0511331b47e962a", 0x16}, {&(0x7f00000001c0)="be2ec89b7f036f309ca3cd99bfe805781e6bbc000bae427535166b412a01f440a46a0ca7e70cd3b7c2c12e5bd01be5ad662216ee3512614fabc7b02a567373d3dc5e604d49e10781067bd815182b727ed1d764caaa1b6114a496b7228f66891f2519f200d21870d62a41314ef4a5f97b2c3822c75a00a6", 0x77}, {&(0x7f0000000240)="2d13732b93a45ca54abbc05f8b599645732fbccc042f864a2cc952e8dde776dc010ff04b919c0361a7cf767278675aa579d69ceb175d4bd99f6ad35a00407e9e702158211a3c188e", 0x48}, {0xffffffffffffffff}], 0x5, &(0x7f0000000600)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r2, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x1c, 0x1, 0x1, [r0, r7, r9]}}], 0x68}, 0x40041) 00:12:09 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3ff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') r1 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xab43a3a8) 00:12:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r5, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x80}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x40}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x20}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) 00:12:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = memfd_create(&(0x7f0000000240)='ns/mnt\x00', 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)="523559176944dff8572cd046ce374974f98a9f2d30af6e9d762991311a20080a6144df273b07bd335954307bfab16f8b45b3845830f7", 0x36}], 0x1, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x30, 0x1, 0x1, [r0, r2, r1, r0, r3, r4, r1, r5]}}, @rights={{0x14, 0x1, 0x1, [r6]}}], 0x68, 0x4}, 0x20) mount_setattr(r2, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r1}}, 0x20) 00:12:09 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3ff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') r1 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xab43a3a8) 00:12:09 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x1) 00:12:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:09 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r5, 0xc0189375, 0x0) r6 = memfd_create(&(0x7f0000000240)='ns/mnt\x00', 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)="523559176944dff8572cd046ce374974f98a9f2d30af6e9d762991311a20080a6144df273b07bd335954307bfab16f8b45b3845830f7", 0x36}], 0x1, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x30, 0x1, 0x1, [r0, r2, r1, r0, r3, r4, r1, r5]}}, @rights={{0x14, 0x1, 0x1, [r6]}}], 0x68, 0x4}, 0x20) mount_setattr(r2, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r1}}, 0x20) 00:12:09 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3ff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') r1 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0xab43a3a8) 00:12:09 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x80002) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rwm\x00'}, 0xa) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)=r1) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000640)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000440)=""/205, 0xcd}, {&(0x7f0000000540)=""/80, 0x50}], 0x5}, 0x40000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vxcan0\x00'}) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) 00:12:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r5, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x60, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x80}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x40}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x20}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) 00:12:09 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3ff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') r1 = syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) ioctl$MEDIA_IOC_REQUEST_ALLOC(r1, 0x80047c05, &(0x7f0000000100)) 00:12:09 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x25000000) 00:12:09 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x1) 00:12:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wpan1\x00'}) 00:12:09 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) memfd_create(&(0x7f0000000240)='ns/mnt\x00', 0x1) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:09 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3ff, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) 00:12:09 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x1) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x1) (async) 00:12:09 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) getitimer(0x2, &(0x7f0000000500)) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) write$yama_ptrace_scope(r0, &(0x7f0000000000)='0\x00', 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:09 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:12:10 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x80002) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rwm\x00'}, 0xa) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)=r1) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000640)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000440)=""/205, 0xcd}, {&(0x7f0000000540)=""/80, 0x50}], 0x5}, 0x40000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vxcan0\x00'}) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x80002) (async) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rwm\x00'}, 0xa) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r1, 0x0, 0x0) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)=r1) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) recvmsg$kcm(r3, &(0x7f0000000640)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000440)=""/205, 0xcd}, {&(0x7f0000000540)=""/80, 0x50}], 0x5}, 0x40000000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vxcan0\x00'}) (async) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) (async) 00:12:10 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:10 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x3ff, 0x4) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) 00:12:10 executing program 3: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) 00:12:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) 00:12:10 executing program 4: syz_open_dev$audion(&(0x7f0000000000), 0x9, 0x240041) syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) 00:12:10 executing program 4: syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x73b40) [ 728.258946][T28184] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_rx_wq": -EINTR 00:12:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:10 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x280e00, 0x0, 0x10}, 0x18) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:10 executing program 3: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:10 executing program 4: syz_open_dev$media(0x0, 0x0, 0x73b40) 00:12:10 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x80002) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rwm\x00'}, 0xa) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)=r1) (async, rerun: 64) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (rerun: 64) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async, rerun: 32) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (rerun: 32) sendmsg$unix(r3, 0x0, 0x0) (async, rerun: 32) recvmsg$kcm(r3, &(0x7f0000000640)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000440)=""/205, 0xcd}, {&(0x7f0000000540)=""/80, 0x50}], 0x5}, 0x40000000) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002b80)={'vxcan0\x00'}) (async) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) 00:12:10 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) getitimer(0x2, &(0x7f0000000500)) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) write$yama_ptrace_scope(r0, &(0x7f0000000000)='0\x00', 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:10 executing program 4: syz_open_dev$media(0x0, 0x0, 0x73b40) 00:12:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:10 executing program 3: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) (async) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:10 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:10 executing program 4: syz_open_dev$media(0x0, 0x0, 0x73b40) [ 730.171494][T28636] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_rx_wq": -EINTR 00:12:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) timerfd_create(0x4, 0x800) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:11 executing program 4: syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x0) 00:12:11 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) getitimer(0x2, &(0x7f0000000500)) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) write$yama_ptrace_scope(r0, &(0x7f0000000000)='0\x00', 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:11 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='%\xb6\x00', 0x1) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={r0, 0x1, 0x0, 0x1000000000000}) 00:12:11 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x3000, 0x80, &(0x7f0000000500)) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:11 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(0xffffffffffffffff, 0x8004af79, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000080)={0x3, 0x6}) 00:12:11 executing program 4: syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x0) 00:12:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() statx(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x8, &(0x7f00000003c0)) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:11 executing program 4: syz_open_dev$media(&(0x7f00000000c0), 0x0, 0x0) 00:12:11 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount_setattr(r1, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:11 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(0xffffffffffffffff, 0x8004af79, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000080)={0x3, 0x6}) 00:12:11 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='%\xb6\x00', 0x1) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={r0, 0x1, 0x0, 0x1000000000000}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) memfd_create(&(0x7f0000000000)='%\xb6\x00', 0x1) (async) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={r0, 0x1, 0x0, 0x1000000000000}) (async) 00:12:11 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) getitimer(0x2, &(0x7f0000000500)) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) write$yama_ptrace_scope(r0, &(0x7f0000000000)='0\x00', 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:12 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) getitimer(0x2, &(0x7f0000000500)) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:12 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getpid() r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:12 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:12 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(0xffffffffffffffff, 0x8004af79, &(0x7f0000000040)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000080)={0x3, 0x6}) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000080)={0x3, 0x6}) 00:12:12 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = memfd_create(&(0x7f0000000000)='%\xb6\x00', 0x1) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000040)={r0, 0x1, 0x0, 0x1000000000000}) 00:12:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:13 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x2) 00:12:13 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x402dc0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r2, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:13 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000}, 0x20) 00:12:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:13 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x402dc0, 0x0) (async, rerun: 32) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (rerun: 32) 00:12:14 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) getitimer(0x2, &(0x7f0000000500)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r1, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:14 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x2) 00:12:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:14 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000}, 0x20) 00:12:14 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x402dc0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x402dc0, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) 00:12:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r1, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r3, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:14 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000}, 0x20) 00:12:14 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x2) (async) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x4, 0x2) 00:12:14 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:15 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:15 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x4c000000) 00:12:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x2, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r0}, 0x4) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r0 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:15 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:15 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x9, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:15 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x2, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r0}, 0x4) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:15 executing program 0: r0 = syz_open_dev$audion(0x0, 0x9, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) [ 731.001989][T28661] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_tx_wq": -EINTR [ 735.235255][T28937] __nla_validate_parse: 3 callbacks suppressed [ 735.235271][T28937] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:15 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:15 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:15 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x2, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r0}, 0x4) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:15 executing program 0: r0 = syz_open_dev$audion(0x0, 0x9, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:15 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:16 executing program 0: r0 = syz_open_dev$audion(0x0, 0x9, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) [ 736.015748][T28963] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:16 executing program 3: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x59}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x2}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x49}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x6}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x9}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1a}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x12}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1b}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8001}, 0xd0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4001) 00:12:16 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x800, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:16 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r1, r3}) accept4$nfc_llcp(r3, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80000) 00:12:16 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) [ 736.111650][T28980] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:12:16 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x72, 0x80000, {r0}}, 0x20) 00:12:16 executing program 3: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x59}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x2}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x49}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x6}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x9}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1a}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x12}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1b}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8001}, 0xd0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4001) 00:12:16 executing program 4: mount$afs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000, &(0x7f0000000100)={[{@dyn}, {@flock_write}, {}, {@flock_openafs}, {@dyn}, {@flock_write}, {@flock_openafs}, {}, {@flock_openafs}], [{@seclabel}, {@euid_gt}]}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002b80)={'vcan0\x00'}) getpeername(r0, &(0x7f0000000380)=@nfc_llcp, &(0x7f0000000400)=0x80) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) socketpair(0x11, 0x2, 0x401, &(0x7f0000000240)) 00:12:16 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x0) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:16 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="612d3dd41a0630fc2e0200696c653000"]) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:16 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) (async) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r1, r3}) accept4$nfc_llcp(r3, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80000) (async) accept4$nfc_llcp(r3, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80000) 00:12:16 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x0) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:16 executing program 3: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x59}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x2}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x49}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x6}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x9}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1a}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x12}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1b}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8001}, 0xd0) (async) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x59}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x2}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x49}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x6}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x9}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1a}, @IEEE802154_ATTR_CHANNELS={0x8}, @IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0x12}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1b}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8001}, 0xd0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5}, @FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4001) 00:12:16 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:17 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) (async) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) (async) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000000240)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r1, r3}) accept4$nfc_llcp(r3, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x80000) 00:12:17 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x0) write$6lowpan_control(r0, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:17 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x48015) 00:12:17 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x29, 0x20, 0x0, 0x1, 0x11, @mcast1, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x7800, 0x6, 0x6, 0x5}}) mount$9p_xen(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0xa, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d78656e2c63616368657461673d73797a6daa6c30002c63616368657461673d2c616669643d3078666666666666666666663bf9666663302c6d6d61702c616e616d653d002c63616368653d6d6d61702c6163636573733d616e792c756e616d653d2c61632dedeb9c5a10f834f6fed1195529ad7c4a484556446f8f0a1ccb074b0000000000", @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c66736e616d653d697036746e6c30002c646f6e745f61707072616973652c6673757569643d00646651336139382d373531622d396363332d643065342d39353033da6436652c6d6561737572652c646566636f6e746578743d73746166665f752c00"]) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r5, 0x2, {0x1, 0x0, 0x2}, 0xfd}, 0x18) 00:12:17 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:17 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:17 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:17 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0xfffffff8, 0x1, 0x80, 0x0, 0x67, 0x5, 0x8, 0x587}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:17 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x29, 0x20, 0x0, 0x1, 0x11, @mcast1, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x7800, 0x6, 0x6, 0x5}}) mount$9p_xen(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0xa, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d78656e2c63616368657461673d73797a6daa6c30002c63616368657461673d2c616669643d3078666666666666666666663bf9666663302c6d6d61702c616e616d653d002c63616368653d6d6d61702c6163636573733d616e792c756e616d653d2c61632dedeb9c5a10f834f6fed1195529ad7c4a484556446f8f0a1ccb074b0000000000", @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c66736e616d653d697036746e6c30002c646f6e745f61707072616973652c6673757569643d00646651336139382d373531622d396363332d643065342d39353033da6436652c6d6561737572652c646566636f6e746578743d73746166665f752c00"]) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r5, 0x2, {0x1, 0x0, 0x2}, 0xfd}, 0x18) 00:12:17 executing program 0: syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:17 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x48015) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x48015) (async) 00:12:17 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x72, 0x80000, {r0}}, 0x20) 00:12:17 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:17 executing program 0: syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:17 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x72, 0x80000, {r0}}, 0x20) 00:12:17 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x29, 0x20, 0x0, 0x1, 0x11, @mcast1, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x7800, 0x6, 0x6, 0x5}}) mount$9p_xen(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0xa, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d78656e2c63616368657461673d73797a6daa6c30002c63616368657461673d2c616669643d3078666666666666666666663bf9666663302c6d6d61702c616e616d653d002c63616368653d6d6d61702c6163636573733d616e792c756e616d653d2c61632dedeb9c5a10f834f6fed1195529ad7c4a484556446f8f0a1ccb074b0000000000", @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c66736e616d653d697036746e6c30002c646f6e745f61707072616973652c6673757569643d00646651336139382d373531622d396363332d643065342d39353033da6436652c6d6561737572652c646566636f6e746578743d73746166665f752c00"]) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r5, 0x2, {0x1, 0x0, 0x2}, 0xfd}, 0x18) 00:12:17 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:18 executing program 0: syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000880)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 00:12:18 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x48015) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getneigh={0x14, 0x1e, 0x400, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x48015) (async) 00:12:18 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(r0, 0x0, 0x0) 00:12:18 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:18 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:18 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x29, 0x20, 0x0, 0x1, 0x11, @mcast1, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x7800, 0x6, 0x6, 0x5}}) mount$9p_xen(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0xa, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d78656e2c63616368657461673d73797a6daa6c30002c63616368657461673d2c616669643d3078666666666666666666663bf9666663302c6d6d61702c616e616d653d002c63616368653d6d6d61702c6163636573733d616e792c756e616d653d2c61632dedeb9c5a10f834f6fed1195529ad7c4a484556446f8f0a1ccb074b0000000000", @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c66736e616d653d697036746e6c30002c646f6e745f61707072616973652c6673757569643d00646651336139382d373531622d396363332d643065342d39353033da6436652c6d6561737572652c646566636f6e746578743d73746166665f752c00"]) 00:12:18 executing program 5: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$yama_ptrace_scope(r0, &(0x7f0000000140)='2\x00', 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000200)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x2) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) 00:12:18 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x72, 0x80000, {r0}}, 0x20) 00:12:18 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(r0, 0x0, 0x0) 00:12:18 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:18 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:18 executing program 5: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) write$yama_ptrace_scope(r0, &(0x7f0000000140)='2\x00', 0x2) (async, rerun: 32) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (rerun: 32) sendmsg$unix(r1, 0x0, 0x0) (async) timerfd_gettime(r1, &(0x7f0000000200)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x2) (async, rerun: 64) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) (rerun: 64) 00:12:18 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:18 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000840), 0x0, 0x2242) write$6lowpan_control(r0, 0x0, 0x0) 00:12:18 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x29, 0x20, 0x0, 0x1, 0x11, @mcast1, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x7800, 0x6, 0x6, 0x5}}) 00:12:19 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, r0, 0x0, 0x5}, 0x48) 00:12:19 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:19 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:19 executing program 5: r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$yama_ptrace_scope(r0, &(0x7f0000000140)='2\x00', 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000200)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x2) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) write$yama_ptrace_scope(r0, &(0x7f0000000140)='2\x00', 0x2) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r1, 0x0, 0x0) (async) timerfd_gettime(r1, &(0x7f0000000200)) (async) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x2) (async) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) (async) 00:12:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:19 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) 00:12:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x72, 0x0, {r0}}, 0x20) 00:12:19 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:19 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:19 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = geteuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10004, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@seclabel}]}}) 00:12:19 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:19 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x72}, 0x20) [ 740.326636][ T2222] ieee802154 phy0 wpan0: encryption failed: -22 [ 740.328237][ T2222] ieee802154 phy1 wpan1: encryption failed: -22 00:12:20 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x163080, 0x0, 0x8}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:20 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:20 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:20 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x72}, 0x20) 00:12:20 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) sendmsg$unix(r0, 0x0, 0x0) r1 = geteuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10004, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@seclabel}]}}) 00:12:20 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:20 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:20 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x72}, 0x20) 00:12:20 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000}, 0x20) 00:12:20 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) r1 = geteuid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x10004, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x2}}], [{@seclabel}]}}) 00:12:20 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:20 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r4, r3}) 00:12:21 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000}, 0x20) 00:12:21 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:21 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r3}) 00:12:21 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:21 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:21 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x72}, 0x20) 00:12:21 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r3}) 00:12:21 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:21 executing program 0: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000}, 0x20) 00:12:21 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:21 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:21 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:21 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r2}) 00:12:22 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:22 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:22 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:22 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r2}) 00:12:22 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:22 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:22 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000200)='./file1\x00', 0x0, 0x18}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) 00:12:22 executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0xfffffb12, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x301000, 0x40, 0x6}, 0x18) statx(r4, &(0x7f0000000240)='./file0\x00', 0x1000, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) renameat2(r5, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:12:22 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:22 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r2}) 00:12:22 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:22 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, 0x0, 0x2, {0x1, 0xf0, 0x2}, 0xfd}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 00:12:23 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:23 executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0xfffffb12, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) (async) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x301000, 0x40, 0x6}, 0x18) statx(r4, &(0x7f0000000240)='./file0\x00', 0x1000, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) renameat2(r5, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) r2 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0xfffffb12, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x301000, 0x40, 0x6}, 0x18) statx(r4, &(0x7f0000000240)='./file0\x00', 0x1000, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) renameat2(r5, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0xfffffb12, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) (async) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) (async) syz_open_dev$audion(0x0, 0x0, 0x0) (async) sendmsg$unix(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) (async) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x301000, 0x40, 0x6}, 0x18) (async) statx(r4, &(0x7f0000000240)='./file0\x00', 0x1000, 0x2, &(0x7f0000000280)) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) renameat2(r5, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) (async) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4000, r1}, 0xfffffece) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 00:12:23 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000180)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f00000000c0)=0xc0, 0x2) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r4}) 00:12:23 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:23 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) (async) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 00:12:23 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x80000, {r0}}, 0x20) 00:12:23 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000180)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f00000000c0)=0xc0, 0x2) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r4}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000180)) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f00000000c0)=0xc0, 0x2) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r4}) (async) 00:12:23 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x80000, {r0}}, 0x20) 00:12:23 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) (async) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) (async) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (async) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) (async) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 743.497265][T29325] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_rx_wq": -EINTR [ 743.772466][T29372] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_tx_wq": -EINTR 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x16e3d51c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:23 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000180)) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f00000000c0)=0xc0, 0x2) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r4}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000180)) (async) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) sendmsg$unix(r3, 0x0, 0x0) (async) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f00000000c0)=0xc0, 0x2) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000080)) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r4}) (async) 00:12:23 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x80000, {r0}}, 0x20) 00:12:23 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:23 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x0, {r0}}, 0x20) 00:12:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) [ 743.778617][T29388] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_rx_wq": -EINTR 00:12:23 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:23 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080}, 0x20) 00:12:24 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:24 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:24 executing program 3: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400004c0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) mount$afs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x8020, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = geteuid() quotactl$Q_SETQUOTA(0xffffffff80000802, &(0x7f0000000240)=@filename='./file0\x00', r1, &(0x7f0000000280)={0xca5, 0x1, 0x8000000000000001, 0x2, 0x9c, 0xdd0c, 0x9, 0xffffffff80000000, 0x5}) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x8c082, 0x80, 0x1}, 0x18) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) r4 = geteuid() getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) r6 = geteuid() statx(r2, &(0x7f0000000640)='./file0\x00', 0x6000, 0x100, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540), 0xb0000, &(0x7f0000000780)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7111}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1600}}], [{@smackfsdef}, {@flag='rw'}, {@fowner_gt={'fowner>', r1}}, {@uid_gt={'uid>', r6}}, {@euid_gt={'euid>', r1}}, {@euid_eq={'euid', 0x3d, r1}}, {@uid_gt={'uid>', r7}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) statx(r2, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x2, &(0x7f0000000040)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:24 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080}, 0x20) 00:12:24 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:24 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000}, 0x48) 00:12:24 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080}, 0x20) 00:12:24 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:24 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:24 executing program 3: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400004c0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) (async) mount$afs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x8020, &(0x7f0000000440)=ANY=[@ANYBLOB="6175746f63656c6c2c6175746b63656c3d77726974652c6479636580dee3efaa966000a006f20ba0d7a017498f0e5f43fe23649f84ec6b3d6c6f63616c2c666c6f636b3d6f70656e617a732c666cbb6f636b3d77726974652c736d61636b6673726f2f7455087e3d292c6673636f6e746578583d73746166665f752c736d61636be28408e6553c6506250000000000001a14ae7594fb83152e59b6cce426cbfe4089286bf0c6b5cb60a3bde574aa1065defcfe12b9e83b3e81f410a1af3a07c1831ccb7f48481c50c496b93bef3e0043ec2d2a0b444ac589f313efa878d161e8736f74f35bca5283ec4a46c66ea24f435ed771e1ed1b2e3a4e22af"]) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = geteuid() quotactl$Q_SETQUOTA(0xffffffff80000802, &(0x7f0000000240)=@filename='./file0\x00', r1, &(0x7f0000000280)={0xca5, 0x1, 0x8000000000000001, 0x2, 0x9c, 0xdd0c, 0x9, 0xffffffff80000000, 0x5}) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x8c082, 0x80, 0x1}, 0x18) (async) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) (async) r4 = geteuid() (async) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) (async) r6 = geteuid() (async) statx(r2, &(0x7f0000000640)='./file0\x00', 0x6000, 0x100, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540), 0xb0000, &(0x7f0000000780)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7111}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1600}}], [{@smackfsdef}, {@flag='rw'}, {@fowner_gt={'fowner>', r1}}, {@uid_gt={'uid>', r6}}, {@euid_gt={'euid>', r1}}, {@euid_eq={'euid', 0x3d, r1}}, {@uid_gt={'uid>', r7}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) statx(r2, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x2, &(0x7f0000000040)) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:24 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:24 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:24 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:24 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:24 executing program 3: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400004c0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) (async) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) mount$afs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x8020, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) geteuid() (async) r1 = geteuid() quotactl$Q_SETQUOTA(0xffffffff80000802, &(0x7f0000000240)=@filename='./file0\x00', r1, &(0x7f0000000280)={0xca5, 0x1, 0x8000000000000001, 0x2, 0x9c, 0xdd0c, 0x9, 0xffffffff80000000, 0x5}) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x8c082, 0x80, 0x1}, 0x18) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) geteuid() (async) r4 = geteuid() getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) geteuid() (async) r6 = geteuid() statx(r2, &(0x7f0000000640)='./file0\x00', 0x6000, 0x100, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540), 0xb0000, &(0x7f0000000780)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7111}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1600}}], [{@smackfsdef}, {@flag='rw'}, {@fowner_gt={'fowner>', r1}}, {@uid_gt={'uid>', r6}}, {@euid_gt={'euid>', r1}}, {@euid_eq={'euid', 0x3d, r1}}, {@uid_gt={'uid>', r7}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) statx(r2, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x2, &(0x7f0000000040)) (async) statx(r2, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x2, &(0x7f0000000040)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:24 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) 00:12:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:25 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000}, 0x48) 00:12:25 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) 00:12:25 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:25 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) inotify_init1(0x800) 00:12:25 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) 00:12:25 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) 00:12:25 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)={r1}) 00:12:25 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) 00:12:25 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) inotify_init1(0x800) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) (async) inotify_init1(0x800) (async) 00:12:25 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:25 executing program 4: socket$kcm(0x29, 0x5, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r0}) [ 743.939749][T29427] workqueue: Failed to create a rescuer kthread for wq "nfc5_nci_cmd_wq": -EINTR 00:12:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:26 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$MEDIA_REQUEST_IOC_QUEUE(0xffffffffffffffff, 0x7c80, 0x0) 00:12:26 executing program 4: socket$kcm(0x29, 0x5, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r0}) 00:12:26 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:26 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x18) inotify_init1(0x800) 00:12:26 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000}, 0x48) 00:12:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x8, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40901}, 0x40) 00:12:26 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:26 executing program 4: socket$kcm(0x29, 0x5, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={r0}) 00:12:26 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:26 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:26 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:26 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:27 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8000000}, 0x48) 00:12:27 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:27 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:27 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:27 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:27 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:27 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:27 executing program 1: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 00:12:27 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:27 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:27 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)) 00:12:28 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 00:12:28 executing program 1: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 00:12:28 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r1, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20040040) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r3, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:28 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040), 0xc56, 0x0) sendmsg$unix(r1, 0x0, 0x200080c0) r2 = fspick(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/71, 0x47}], 0x1, &(0x7f0000000300)=""/184, 0xb8}, 0x2041) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000440), 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x8811}, 0x1) 00:12:28 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)=0x0) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, r2, 0x0, 0x3, 0x66, 0x81, "082452caf56c0fcb4b725c472c9fe854e5281e4b258951684fa68b75ebae2acd9e154470853c00819f504515f65dca918769b0fe14bf9e7c622a7e59a87dd3", 0x13}, 0x60) socketpair(0x2, 0x1, 0x4f5b01ea, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) 00:12:28 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 00:12:28 executing program 1: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 00:12:28 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040), 0xc56, 0x0) sendmsg$unix(r1, 0x0, 0x200080c0) (async) r2 = fspick(r0, &(0x7f0000000000)='./file0\x00', 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) (async) recvmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/71, 0x47}], 0x1, &(0x7f0000000300)=""/184, 0xb8}, 0x2041) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) (async) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000440), 0x4) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x8811}, 0x1) 00:12:28 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:28 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 00:12:28 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)=0x0) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, r2, 0x0, 0x3, 0x66, 0x81, "082452caf56c0fcb4b725c472c9fe854e5281e4b258951684fa68b75ebae2acd9e154470853c00819f504515f65dca918769b0fe14bf9e7c622a7e59a87dd3", 0x13}, 0x60) (async) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, r2, 0x0, 0x3, 0x66, 0x81, "082452caf56c0fcb4b725c472c9fe854e5281e4b258951684fa68b75ebae2acd9e154470853c00819f504515f65dca918769b0fe14bf9e7c622a7e59a87dd3", 0x13}, 0x60) socketpair(0x2, 0x1, 0x4f5b01ea, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) 00:12:28 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:28 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000300)) 00:12:28 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080), 0x48) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00'}) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:28 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:28 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040), 0xc56, 0x0) sendmsg$unix(r1, 0x0, 0x200080c0) (async, rerun: 32) r2 = fspick(r0, &(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 32) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r3 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x0) (async, rerun: 64) recvmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/71, 0x47}], 0x1, &(0x7f0000000300)=""/184, 0xb8}, 0x2041) (async, rerun: 64) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) sendmsg$unix(r4, 0x0, 0x0) (async, rerun: 64) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000440), 0x4) (async, rerun: 64) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), r2) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x8811}, 0x1) 00:12:28 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080), 0x48) 00:12:28 executing program 4: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xff, 0x0, 0x1, 0xfffffb12, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r1, 0x0, 0xffff8000a53affff) r2 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x301000, 0x40, 0x6}, 0x18) statx(r4, &(0x7f0000000240)='./file0\x00', 0x1000, 0x2, &(0x7f0000000280)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) renameat2(r5, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:12:28 executing program 3: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) (async) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000000)=0x0) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, r2, 0x0, 0x3, 0x66, 0x81, "082452caf56c0fcb4b725c472c9fe854e5281e4b258951684fa68b75ebae2acd9e154470853c00819f504515f65dca918769b0fe14bf9e7c622a7e59a87dd3", 0x13}, 0x60) socketpair(0x2, 0x1, 0x4f5b01ea, &(0x7f00000000c0)) (async) socketpair(0x2, 0x1, 0x4f5b01ea, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) 00:12:28 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 00:12:28 executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080), 0x48) 00:12:28 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 00:12:28 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:12:28 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x200000000000, 0x1d7a81) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000300)={r2}) 00:12:28 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x100080, 0x0, 0x80000, {r0}}, 0x20) 00:12:28 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00'}) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:28 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 00:12:28 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:28 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x72, 0x80000, {r0}}, 0x20) 00:12:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:28 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) 00:12:28 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:12:28 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 00:12:28 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 745.743932][T29542] workqueue: Failed to create a rescuer kthread for wq "nfc4_nci_tx_wq": -EINTR [ 748.753963][T29783] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan1\x00'}) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan3\x00'}) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:28 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) [ 748.900331][T29811] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:12:28 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 00:12:28 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0xa000000) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:28 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 00:12:29 executing program 5: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0xe000000) [ 749.031992][T29824] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 749.115024][T29835] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 00:12:29 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x5000000) 00:12:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x989680) 00:12:29 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x1fffff) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 749.255509][T29854] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 749.272286][T29857] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="580000005400000825bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="01020000fc0200000000000000000000000000000000000020000100", @ANYRES32=r2, @ANYBLOB="01003600e000000100000000000000000000000008000000"], 0x58}, 0x1, 0x0, 0x0, 0x44}, 0x6000000) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000, {r3}}, 0x20) 00:12:29 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x40000) 00:12:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="580000005400000825bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="01020000fc0200000000000000000000000000000000000020000100", @ANYRES32=r2, @ANYBLOB="01003600e000000100000000000000000000000008000000"], 0x58}, 0x1, 0x0, 0x0, 0x44}, 0x6000000) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000, {r3}}, 0x20) 00:12:29 executing program 3: openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 00:12:29 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x1fffff) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 749.395585][T29886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="580000005400000825bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="01020000fc0200000000000000000000000000000000000020000100", @ANYRES32=r2, @ANYBLOB="01003600e000000100000000000000000000000008000000"], 0x58}, 0x1, 0x0, 0x0, 0x44}, 0x6000000) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000, {r3}}, 0x20) 00:12:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x6c00) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="580000005400000825bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYBLOB="01020000fc0200000000000000000000000000000000000020000100", @ANYRES32=r2, @ANYBLOB="01003600e000000100000000000000000000000008000000"], 0x58}, 0x1, 0x0, 0x0, 0x44}, 0x6000000) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) [ 749.515146][T29904] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100005, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f00000000c0)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x2d, 0x3b7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0xc, 0x9}, {0x2, 0x2, 0x3, 0x5}, {0x2, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x3, 0x1}, {0x1, 0x1, 0x3, 0x3}, {0x3, 0x5, 0x8, 0x1}, {0x5, 0x5, 0xd}, {0x5, 0x5, 0x12, 0x4}], 0x10, 0x101}, 0x90) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 749.549011][T29912] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00', 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) [ 749.582441][T29915] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:12:29 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x1100) 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100005, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f00000000c0)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x2d, 0x3b7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0xc, 0x9}, {0x2, 0x2, 0x3, 0x5}, {0x2, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x3, 0x1}, {0x1, 0x1, 0x3, 0x3}, {0x3, 0x5, 0x8, 0x1}, {0x5, 0x5, 0xd}, {0x5, 0x5, 0x12, 0x4}], 0x10, 0x101}, 0x90) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x5, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x3f}, @IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x2c}}, 0x40) 00:12:29 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r1 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800, 0xffffffffffffffff}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r7, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() syz_open_procfs$userns(r9, 0x0) r10 = geteuid() r11 = geteuid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)="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", 0x1000}], 0x1, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r5, r6]}}, @rights={{0x1c, 0x1, 0x1, [r7, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}], 0x100, 0x400c0}, 0x24044841) 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100005, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f00000000c0)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x2d, 0x3b7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0xc, 0x9}, {0x2, 0x2, 0x3, 0x5}, {0x2, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x3, 0x1}, {0x1, 0x1, 0x3, 0x3}, {0x3, 0x5, 0x8, 0x1}, {0x5, 0x5, 0xd}, {0x5, 0x5, 0x12, 0x4}], 0x10, 0x101}, 0x90) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) ioctl$TFD_IOC_SET_TICKS(r0, 0x40085400, &(0x7f0000000240)=0x400) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100005, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f00000000c0)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x2d, 0x3b7, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0xc, 0x9}, {0x2, 0x2, 0x3, 0x5}, {0x2, 0x3, 0x1, 0xc}, {0x4, 0x5, 0x3, 0x1}, {0x1, 0x1, 0x3, 0x3}, {0x3, 0x5, 0x8, 0x1}, {0x5, 0x5, 0xd}, {0x5, 0x5, 0x12, 0x4}], 0x10, 0x101}, 0x90) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) sendmsg$unix(r1, 0x0, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r1 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800, 0xffffffffffffffff}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r7, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() syz_open_procfs$userns(r9, 0x0) r10 = geteuid() r11 = geteuid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)="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", 0x1000}], 0x1, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r5, r6]}}, @rights={{0x1c, 0x1, 0x1, [r7, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}], 0x100, 0x400c0}, 0x24044841) 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r1 = getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800, 0xffffffffffffffff}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r7, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() syz_open_procfs$userns(r9, 0x0) r10 = geteuid() r11 = geteuid() sendmsg$unix(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)="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", 0x1000}], 0x1, &(0x7f00000013c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2}}}, @rights={{0x20, 0x1, 0x1, [r3, r4, r5, r6]}}, @rights={{0x1c, 0x1, 0x1, [r7, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r11, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}], 0x100, 0x400c0}, 0x24044841) 00:12:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={0x0}}, 0x40) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) syz_open_dev$audion(0x0, 0x0, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={0x0}}, 0x40) 00:12:29 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)) r4 = getpid() syz_open_procfs$userns(r4, 0x0) geteuid() geteuid() 00:12:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000480)={&(0x7f0000000100), 0xc, 0x0}, 0x40) 00:12:29 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) connect$can_j1939(r0, 0x0, 0xffff8000a53affff) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x74) 00:12:29 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:29 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x501000) mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:29 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)) r4 = getpid() syz_open_procfs$userns(r4, 0x0) geteuid() 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) sendmsg$unix(r0, 0x0, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x7a) 00:12:30 executing program 4: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01"], 0x24}}, 0x0) r2 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r2}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="f6a1409f7d6e7d553d9c30ff40a62427baeba7a8fafa011816d76da27e41aa2efea7c786fa8855fd7994033369583dab35ac3fcfc278a74b292bb5edc42658e842b3e920c2269715b65b8dd10c24879b9a89a24a", 0x54}], 0x1, 0x0, 0x0, 0x90}, 0x4000) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x68) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)) r4 = getpid() syz_open_procfs$userns(r4, 0x0) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x24}}, 0x0) r2 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r2}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x100, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)) getpid() 00:12:30 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x4c) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x100087, 0x40000}, 0x20) 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) statx(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x4000, 0x7ff, &(0x7f00000012c0)) 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) umount2(&(0x7f0000000500)='./file0\x00', 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:30 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x60) 00:12:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r2 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r2}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) 00:12:30 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f3a17c77e76ca3a1184bc9f2f92d0bec3785d996cb392170193e7422ab9c98bc7410fe3e76ed3148df8bded08fc68ce608dccd44211b91f0231ef98a2f24cc82e30b0f0646471eb45c4ee976ef6472ace926a5bb358a874ec23ec5f820662e562004445913a50c0a4d32f3e19ba4f88157450f51ba3c2f", 0x77, 0x20000881, 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x25) 00:12:30 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, 0x0, 0x0) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:12:30 executing program 2: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x40000}, 0x20) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, 0x0, 0x0) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, 0x0) 00:12:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 2: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, 0x0, 0x0) 00:12:30 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x11) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x40000}, 0x20) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 2: socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000540)=@pppol2tpv3, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x40000}, 0x20) 00:12:30 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x18) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x40000}, 0x20) 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x1) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r3) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x1) 00:12:30 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00), 0x200000, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, 0x0, 0x1) 00:12:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$IEEE802154_SCAN_REQ(r4, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r5, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) 00:12:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) statx(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400, 0x40, &(0x7f0000001140)) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/253, 0xfd}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:30 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') getpgid(0xffffffffffffffff) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r4, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r5) sendmsg$IEEE802154_SCAN_REQ(r5, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r6, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:30 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 00:12:30 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:31 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) 00:12:31 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 00:12:31 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x2) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:31 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:31 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 00:12:31 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) 00:12:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r6) sendmsg$IEEE802154_SCAN_REQ(r6, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r7, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r7, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:31 executing program 3: ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) 00:12:31 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000700)=""/55, 0x37}, 0x1) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x1) 00:12:31 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) 00:12:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 00:12:31 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r7) sendmsg$IEEE802154_SCAN_REQ(r7, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r8, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r8, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) 00:12:31 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x9, 0x0) 00:12:31 executing program 4: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x8, 0x0) 00:12:31 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x9, 0x0) 00:12:31 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r6) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r7) sendmsg$IEEE802154_SCAN_REQ(r7, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r8, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r8, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00'}) 00:12:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:31 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r6) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r7) sendmsg$IEEE802154_SCAN_REQ(r7, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r8, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r8, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00'}) 00:12:32 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000001240)={0xb, 0x3, 0x9, 0x80800}) 00:12:32 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x9, 0x0) 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:32 executing program 5: getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3}, 0x0, 0x9, 0x2, 0x8000000000000001, 0x0, 0x0, 0x8}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:32 executing program 2: getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3}, 0x595, 0x9, 0x2, 0x8000000000000001, 0x0, 0x0, 0x8}) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x0, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:32 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) 00:12:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x24}}, 0x0) r3 = geteuid() mount$afs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x4, &(0x7f00000000c0)={[{@flock_local}, {@flock_write}, {}, {@flock_write}, {@flock_local}, {@dyn}], [{@permit_directio}, {@uid_eq={'uid', 0x3d, r3}}]}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, 0x0, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r4) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000540), r0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, r5, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000012c0), r6) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r7) sendmsg$IEEE802154_SCAN_REQ(r7, &(0x7f0000000480)={&(0x7f0000000100), 0xc, &(0x7f0000000800)={&(0x7f00000004c0)={0x24, r8, 0x1, 0x10, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x0, 0x1d, 0xe}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0x3f}, @IEEE802154_ATTR_PAGE={0x0, 0x1d, 0x14}, @IEEE802154_ATTR_SCAN_TYPE={0x0, 0x13, 0xe}]}, 0x24}}, 0x40) sendmsg$IEEE802154_LLSEC_LIST_DEV(r6, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r8, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4084}, 0x4004005) r9 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEV(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r9, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x9f30dee73ed09026}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x2000c8c1}, 0x20000004) 00:12:32 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) nanosleep(0x0, &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:32 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) nanosleep(0x0, &(0x7f0000000080)) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 00:12:32 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 1) 00:12:32 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) (fail_nth: 1) 00:12:32 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) (fail_nth: 1) [ 752.458426][T30304] FAULT_INJECTION: forcing a failure. 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 752.458426][T30304] name failslab, interval 1, probability 0, space 0, times 0 [ 752.462938][T30308] FAULT_INJECTION: forcing a failure. [ 752.462938][T30308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.464056][T30304] CPU: 1 PID: 30304 Comm: syz-executor.3 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.468746][T30304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.471244][T30304] Call trace: [ 752.472082][T30304] dump_backtrace+0x1b8/0x1e4 [ 752.473252][T30304] show_stack+0x2c/0x44 [ 752.474294][T30304] dump_stack_lvl+0xd0/0x124 [ 752.475472][T30304] dump_stack+0x1c/0x28 [ 752.476545][T30304] should_fail_ex+0x3b0/0x50c [ 752.477809][T30304] __should_failslab+0xc8/0x128 [ 752.479036][T30304] should_failslab+0x10/0x28 [ 752.480183][T30304] __kmem_cache_alloc_node+0x80/0x368 [ 752.481634][T30304] __kmalloc+0xb8/0x1b8 [ 752.482709][T30304] tomoyo_realpath_from_path+0xc8/0x4cc [ 752.484130][T30304] tomoyo_path_number_perm+0x1ec/0x6a8 [ 752.485574][T30304] tomoyo_file_ioctl+0x2c/0x3c [ 752.486774][T30304] security_file_ioctl+0x80/0xbc [ 752.488034][T30304] __arm64_sys_ioctl+0xa8/0x1c8 [ 752.489238][T30304] invoke_syscall+0x98/0x2b8 [ 752.490412][T30304] el0_svc_common+0x130/0x23c [ 752.491565][T30304] do_el0_svc+0x48/0x58 [ 752.492666][T30304] el0_svc+0x54/0x158 [ 752.493675][T30304] el0t_64_sync_handler+0x84/0xfc [ 752.494983][T30304] el0t_64_sync+0x190/0x194 00:12:32 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 1) [ 752.498209][T30308] CPU: 0 PID: 30308 Comm: syz-executor.1 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.500767][T30308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.503280][T30308] Call trace: [ 752.503645][T30313] FAULT_INJECTION: forcing a failure. [ 752.503645][T30313] name failslab, interval 1, probability 0, space 0, times 0 [ 752.504079][T30308] dump_backtrace+0x1b8/0x1e4 [ 752.508494][T30308] show_stack+0x2c/0x44 [ 752.509522][T30308] dump_stack_lvl+0xd0/0x124 [ 752.510636][T30308] dump_stack+0x1c/0x28 [ 752.511664][T30308] should_fail_ex+0x3b0/0x50c [ 752.512809][T30308] should_fail+0x14/0x24 [ 752.513878][T30308] should_fail_usercopy+0x20/0x30 [ 752.515094][T30308] copy_msghdr_from_user+0xb8/0x59c [ 752.516414][T30308] __sys_recvmsg+0x1fc/0x350 [ 752.517579][T30308] __arm64_sys_recvmsg+0x80/0x94 [ 752.518773][T30308] invoke_syscall+0x98/0x2b8 [ 752.519887][T30308] el0_svc_common+0x130/0x23c [ 752.521070][T30308] do_el0_svc+0x48/0x58 [ 752.522058][T30308] el0_svc+0x54/0x158 [ 752.523034][T30308] el0t_64_sync_handler+0x84/0xfc [ 752.524281][T30308] el0t_64_sync+0x190/0x194 [ 752.526582][T30313] CPU: 1 PID: 30313 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.529136][T30313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.531718][T30313] Call trace: [ 752.532594][T30313] dump_backtrace+0x1b8/0x1e4 [ 752.533793][T30313] show_stack+0x2c/0x44 [ 752.534868][T30313] dump_stack_lvl+0xd0/0x124 [ 752.536096][T30313] dump_stack+0x1c/0x28 [ 752.537099][T30313] should_fail_ex+0x3b0/0x50c [ 752.538335][T30313] __should_failslab+0xc8/0x128 [ 752.539551][T30313] should_failslab+0x10/0x28 [ 752.540655][T30313] kmem_cache_alloc+0x80/0x410 [ 752.541887][T30313] getname_flags+0xd0/0x48c [ 752.543104][T30313] getname+0x28/0x38 [ 752.544097][T30313] do_sys_openat2+0xd0/0x1b8 [ 752.545258][T30313] __arm64_sys_openat+0x1f0/0x240 [ 752.545451][T30304] ERROR: Out of memory at tomoyo_realpath_from_path. [ 752.546546][T30313] invoke_syscall+0x98/0x2b8 [ 752.546561][T30313] el0_svc_common+0x130/0x23c [ 752.546569][T30313] do_el0_svc+0x48/0x58 [ 752.546582][T30313] el0_svc+0x54/0x158 [ 752.546594][T30313] el0t_64_sync_handler+0x84/0xfc [ 752.553868][T30313] el0t_64_sync+0x190/0x194 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:32 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) (fail_nth: 2) 00:12:32 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) (fail_nth: 1) [ 752.582665][T30315] FAULT_INJECTION: forcing a failure. [ 752.582665][T30315] name failslab, interval 1, probability 0, space 0, times 0 [ 752.586739][T30320] FAULT_INJECTION: forcing a failure. [ 752.586739][T30320] name fail_usercopy, interval 1, probability 0, space 0, times 0 00:12:32 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 2) [ 752.600148][T30315] CPU: 1 PID: 30315 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.602644][T30315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.605100][T30315] Call trace: [ 752.605921][T30315] dump_backtrace+0x1b8/0x1e4 [ 752.607041][T30315] show_stack+0x2c/0x44 [ 752.608090][T30315] dump_stack_lvl+0xd0/0x124 [ 752.609197][T30315] dump_stack+0x1c/0x28 [ 752.610169][T30315] should_fail_ex+0x3b0/0x50c [ 752.611407][T30315] __should_failslab+0xc8/0x128 [ 752.612535][T30323] FAULT_INJECTION: forcing a failure. [ 752.612535][T30323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.612672][T30315] should_failslab+0x10/0x28 [ 752.617264][T30315] kmem_cache_alloc+0x80/0x410 [ 752.618474][T30315] getname_flags+0xd0/0x48c [ 752.619645][T30315] getname+0x28/0x38 [ 752.620660][T30315] do_sys_openat2+0xd0/0x1b8 [ 752.621879][T30315] __arm64_sys_openat+0x1f0/0x240 [ 752.623161][T30315] invoke_syscall+0x98/0x2b8 [ 752.624365][T30315] el0_svc_common+0x130/0x23c [ 752.625572][T30315] do_el0_svc+0x48/0x58 [ 752.626656][T30315] el0_svc+0x54/0x158 [ 752.627700][T30315] el0t_64_sync_handler+0x84/0xfc [ 752.629045][T30315] el0t_64_sync+0x190/0x194 [ 752.630089][T30323] CPU: 0 PID: 30323 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.632657][T30323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.635197][T30323] Call trace: [ 752.636022][T30323] dump_backtrace+0x1b8/0x1e4 [ 752.637246][T30323] show_stack+0x2c/0x44 [ 752.638266][T30323] dump_stack_lvl+0xd0/0x124 [ 752.639426][T30323] dump_stack+0x1c/0x28 [ 752.640423][T30323] should_fail_ex+0x3b0/0x50c [ 752.641570][T30323] should_fail+0x14/0x24 [ 752.642653][T30323] should_fail_usercopy+0x20/0x30 [ 752.643986][T30323] strncpy_from_user+0x48/0x54c [ 752.645246][T30323] getname_flags+0x104/0x48c [ 752.646429][T30323] getname+0x28/0x38 [ 752.647482][T30323] do_sys_openat2+0xd0/0x1b8 [ 752.648681][T30323] __arm64_sys_openat+0x1f0/0x240 [ 752.649935][T30323] invoke_syscall+0x98/0x2b8 [ 752.651165][T30323] el0_svc_common+0x130/0x23c [ 752.652332][T30323] do_el0_svc+0x48/0x58 [ 752.653397][T30323] el0_svc+0x54/0x158 [ 752.654447][T30323] el0t_64_sync_handler+0x84/0xfc [ 752.655742][T30323] el0t_64_sync+0x190/0x194 [ 752.656905][T30320] CPU: 1 PID: 30320 Comm: syz-executor.5 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.659508][T30320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.662073][T30320] Call trace: [ 752.662929][T30320] dump_backtrace+0x1b8/0x1e4 [ 752.664102][T30320] show_stack+0x2c/0x44 [ 752.665125][T30320] dump_stack_lvl+0xd0/0x124 [ 752.666205][T30320] dump_stack+0x1c/0x28 [ 752.667236][T30320] should_fail_ex+0x3b0/0x50c 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 752.668371][T30320] should_fail+0x14/0x24 [ 752.669426][T30320] should_fail_usercopy+0x20/0x30 [ 752.670715][T30320] __arm64_sys_mount_setattr+0x260/0x1794 [ 752.672110][T30320] invoke_syscall+0x98/0x2b8 [ 752.673251][T30320] el0_svc_common+0x130/0x23c [ 752.674442][T30320] do_el0_svc+0x48/0x58 [ 752.675556][T30320] el0_svc+0x54/0x158 [ 752.676628][T30320] el0t_64_sync_handler+0x84/0xfc [ 752.677940][T30320] el0t_64_sync+0x190/0x194 00:12:32 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) (fail_nth: 2) 00:12:32 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 3) [ 752.697325][T30326] FAULT_INJECTION: forcing a failure. [ 752.697325][T30326] name failslab, interval 1, probability 0, space 0, times 0 [ 752.701493][T30326] CPU: 1 PID: 30326 Comm: syz-executor.3 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 00:12:32 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 2) [ 752.703969][T30326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.706488][T30326] Call trace: [ 752.707346][T30326] dump_backtrace+0x1b8/0x1e4 [ 752.708569][T30326] show_stack+0x2c/0x44 [ 752.709555][T30326] dump_stack_lvl+0xd0/0x124 [ 752.710685][T30326] dump_stack+0x1c/0x28 [ 752.711783][T30326] should_fail_ex+0x3b0/0x50c [ 752.712950][T30326] __should_failslab+0xc8/0x128 [ 752.714246][T30326] should_failslab+0x10/0x28 [ 752.715344][T30326] __kmem_cache_alloc_node+0x80/0x368 [ 752.716675][T30326] __kmalloc+0xb8/0x1b8 [ 752.717737][T30326] tomoyo_encode+0x270/0x4b0 [ 752.718948][T30326] tomoyo_realpath_from_path+0x478/0x4cc [ 752.720418][T30326] tomoyo_path_number_perm+0x1ec/0x6a8 [ 752.721813][T30326] tomoyo_file_ioctl+0x2c/0x3c [ 752.723008][T30326] security_file_ioctl+0x80/0xbc [ 752.724236][T30326] __arm64_sys_ioctl+0xa8/0x1c8 [ 752.725456][T30326] invoke_syscall+0x98/0x2b8 [ 752.726612][T30326] el0_svc_common+0x130/0x23c [ 752.727886][T30326] do_el0_svc+0x48/0x58 [ 752.728967][T30326] el0_svc+0x54/0x158 [ 752.729988][T30326] el0t_64_sync_handler+0x84/0xfc [ 752.731275][T30326] el0t_64_sync+0x190/0x194 [ 752.735103][T30330] FAULT_INJECTION: forcing a failure. [ 752.735103][T30330] name failslab, interval 1, probability 0, space 0, times 0 [ 752.736988][T30326] ERROR: Out of memory at tomoyo_realpath_from_path. [ 752.748829][T30330] CPU: 1 PID: 30330 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.751326][T30330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.753922][T30330] Call trace: [ 752.754806][T30330] dump_backtrace+0x1b8/0x1e4 [ 752.755986][T30330] show_stack+0x2c/0x44 [ 752.756969][T30330] dump_stack_lvl+0xd0/0x124 [ 752.758155][T30330] dump_stack+0x1c/0x28 [ 752.759209][T30330] should_fail_ex+0x3b0/0x50c [ 752.760370][T30330] __should_failslab+0xc8/0x128 [ 752.761598][T30330] should_failslab+0x10/0x28 [ 752.762727][T30330] kmem_cache_alloc+0x80/0x410 [ 752.763925][T30330] alloc_empty_file+0xac/0x1d4 [ 752.764791][T30331] FAULT_INJECTION: forcing a failure. [ 752.764791][T30331] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.765109][T30330] path_openat+0xd0/0x2888 [ 752.765126][T30330] do_filp_open+0x1bc/0x3cc [ 752.765141][T30330] do_sys_openat2+0x124/0x1b8 [ 752.765152][T30330] __arm64_sys_openat+0x1f0/0x240 [ 752.765162][T30330] invoke_syscall+0x98/0x2b8 [ 752.774281][T30330] el0_svc_common+0x130/0x23c [ 752.775462][T30330] do_el0_svc+0x48/0x58 [ 752.776621][T30330] el0_svc+0x54/0x158 [ 752.777603][T30330] el0t_64_sync_handler+0x84/0xfc [ 752.778859][T30330] el0t_64_sync+0x190/0x194 [ 752.780003][T30331] CPU: 0 PID: 30331 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.782518][T30331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.785161][T30331] Call trace: [ 752.785999][T30331] dump_backtrace+0x1b8/0x1e4 [ 752.787169][T30331] show_stack+0x2c/0x44 [ 752.788241][T30331] dump_stack_lvl+0xd0/0x124 [ 752.789424][T30331] dump_stack+0x1c/0x28 [ 752.790501][T30331] should_fail_ex+0x3b0/0x50c [ 752.791686][T30331] should_fail+0x14/0x24 [ 752.792785][T30331] should_fail_usercopy+0x20/0x30 [ 752.794068][T30331] strncpy_from_user+0x48/0x54c [ 752.795298][T30331] getname_flags+0x104/0x48c [ 752.796437][T30331] getname+0x28/0x38 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNELS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:32 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) (fail_nth: 2) 00:12:32 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) (fail_nth: 3) 00:12:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNELS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:32 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 4) [ 752.797430][T30331] do_sys_openat2+0xd0/0x1b8 [ 752.798548][T30331] __arm64_sys_openat+0x1f0/0x240 [ 752.799809][T30331] invoke_syscall+0x98/0x2b8 [ 752.800989][T30331] el0_svc_common+0x130/0x23c [ 752.802147][T30331] do_el0_svc+0x48/0x58 [ 752.803229][T30331] el0_svc+0x54/0x158 [ 752.804243][T30331] el0t_64_sync_handler+0x84/0xfc [ 752.805507][T30331] el0t_64_sync+0x190/0x194 [ 752.824276][T30336] FAULT_INJECTION: forcing a failure. [ 752.824276][T30336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.827690][T30336] CPU: 1 PID: 30336 Comm: syz-executor.5 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.830279][T30336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.832731][T30336] Call trace: [ 752.833598][T30336] dump_backtrace+0x1b8/0x1e4 [ 752.834781][T30336] show_stack+0x2c/0x44 [ 752.835802][T30336] dump_stack_lvl+0xd0/0x124 [ 752.836948][T30336] dump_stack+0x1c/0x28 [ 752.838046][T30336] should_fail_ex+0x3b0/0x50c [ 752.839258][T30336] should_fail+0x14/0x24 [ 752.840339][T30336] should_fail_usercopy+0x20/0x30 [ 752.841563][T30336] simple_read_from_buffer+0xd4/0x248 [ 752.842970][T30336] proc_fail_nth_read+0x134/0x1a0 [ 752.844326][T30336] vfs_read+0x284/0x8a4 [ 752.845365][T30336] ksys_read+0x15c/0x26c [ 752.846417][T30336] __arm64_sys_read+0x7c/0x90 [ 752.847553][T30336] invoke_syscall+0x98/0x2b8 [ 752.848742][T30336] el0_svc_common+0x130/0x23c [ 752.849968][T30336] do_el0_svc+0x48/0x58 [ 752.851071][T30336] el0_svc+0x54/0x158 [ 752.852136][T30336] el0t_64_sync_handler+0x84/0xfc [ 752.853408][T30336] el0t_64_sync+0x190/0x194 [ 752.861382][T30337] FAULT_INJECTION: forcing a failure. [ 752.861382][T30337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.873759][T30337] CPU: 1 PID: 30337 Comm: syz-executor.3 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.876363][T30337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.878847][T30337] Call trace: [ 752.879707][T30337] dump_backtrace+0x1b8/0x1e4 [ 752.880908][T30337] show_stack+0x2c/0x44 [ 752.882024][T30337] dump_stack_lvl+0xd0/0x124 [ 752.882522][T30341] FAULT_INJECTION: forcing a failure. [ 752.882522][T30341] name failslab, interval 1, probability 0, space 0, times 0 [ 752.883172][T30337] dump_stack+0x1c/0x28 [ 752.883190][T30337] should_fail_ex+0x3b0/0x50c [ 752.883203][T30337] should_fail+0x14/0x24 [ 752.883213][T30337] should_fail_usercopy+0x20/0x30 [ 752.883237][T30337] simple_read_from_buffer+0xd4/0x248 [ 752.892229][T30337] proc_fail_nth_read+0x134/0x1a0 [ 752.893561][T30337] vfs_read+0x284/0x8a4 [ 752.894575][T30337] ksys_read+0x15c/0x26c [ 752.895667][T30337] __arm64_sys_read+0x7c/0x90 [ 752.896895][T30337] invoke_syscall+0x98/0x2b8 [ 752.898000][T30337] el0_svc_common+0x130/0x23c [ 752.899182][T30337] do_el0_svc+0x48/0x58 [ 752.900296][T30337] el0_svc+0x54/0x158 [ 752.901299][T30337] el0t_64_sync_handler+0x84/0xfc [ 752.902542][T30337] el0t_64_sync+0x190/0x194 [ 752.903708][T30341] CPU: 0 PID: 30341 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 752.906248][T30341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 752.908865][T30341] Call trace: [ 752.909700][T30341] dump_backtrace+0x1b8/0x1e4 [ 752.910948][T30341] show_stack+0x2c/0x44 [ 752.912067][T30341] dump_stack_lvl+0xd0/0x124 [ 752.913232][T30341] dump_stack+0x1c/0x28 [ 752.914306][T30341] should_fail_ex+0x3b0/0x50c [ 752.915493][T30341] __should_failslab+0xc8/0x128 [ 752.916758][T30341] should_failslab+0x10/0x28 [ 752.917938][T30341] kmem_cache_alloc+0x80/0x410 [ 752.919185][T30341] security_file_alloc+0x30/0x124 [ 752.920489][T30341] init_file+0x9c/0x220 [ 752.921557][T30341] alloc_empty_file+0xc0/0x1d4 [ 752.922803][T30341] path_openat+0xd0/0x2888 [ 752.923968][T30341] do_filp_open+0x1bc/0x3cc [ 752.925173][T30341] do_sys_openat2+0x124/0x1b8 [ 752.926378][T30341] __arm64_sys_openat+0x1f0/0x240 [ 752.927726][T30341] invoke_syscall+0x98/0x2b8 [ 752.928902][T30341] el0_svc_common+0x130/0x23c [ 752.930128][T30341] do_el0_svc+0x48/0x58 [ 752.931202][T30341] el0_svc+0x54/0x158 [ 752.932245][T30341] el0t_64_sync_handler+0x84/0xfc [ 752.933597][T30341] el0t_64_sync+0x190/0x194 [ 753.418365][T30319] FAULT_INJECTION: forcing a failure. [ 753.418365][T30319] name failslab, interval 1, probability 0, space 0, times 0 [ 753.421777][T30319] CPU: 1 PID: 30319 Comm: syz-executor.1 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 753.424166][T30319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 753.426764][T30319] Call trace: [ 753.427592][T30319] dump_backtrace+0x1b8/0x1e4 [ 753.428703][T30319] show_stack+0x2c/0x44 [ 753.429908][T30319] dump_stack_lvl+0xd0/0x124 [ 753.431042][T30319] dump_stack+0x1c/0x28 [ 753.432157][T30319] should_fail_ex+0x3b0/0x50c [ 753.433408][T30319] __should_failslab+0xc8/0x128 [ 753.434623][T30319] should_failslab+0x10/0x28 [ 753.435824][T30319] kmem_cache_alloc+0x80/0x410 [ 753.436993][T30319] taskstats_exit+0x1d0/0x884 [ 753.438242][T30319] do_exit+0x47c/0x1f74 [ 753.439251][T30319] do_group_exit+0x194/0x22c [ 753.440323][T30319] get_signal+0x1500/0x15ec [ 753.441469][T30319] do_notify_resume+0x3bc/0x393c [ 753.442752][T30319] el0_svc+0x9c/0x158 [ 753.443787][T30319] el0t_64_sync_handler+0x84/0xfc [ 753.445100][T30319] el0t_64_sync+0x190/0x194 00:12:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CHANNELS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:12:33 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) 00:12:33 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 5) 00:12:33 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:33 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, 0x0) 00:12:33 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 3) 00:12:33 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x70, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) [ 753.496609][T30352] FAULT_INJECTION: forcing a failure. [ 753.496609][T30352] name failslab, interval 1, probability 0, space 0, times 0 00:12:33 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x2, 0x0) [ 753.501827][T30353] FAULT_INJECTION: forcing a failure. [ 753.501827][T30353] name failslab, interval 1, probability 0, space 0, times 0 [ 753.509844][T30353] CPU: 1 PID: 30353 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 753.512460][T30353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 753.515038][T30353] Call trace: [ 753.515893][T30353] dump_backtrace+0x1b8/0x1e4 [ 753.517078][T30353] show_stack+0x2c/0x44 [ 753.518104][T30353] dump_stack_lvl+0xd0/0x124 [ 753.519293][T30353] dump_stack+0x1c/0x28 00:12:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) [ 753.520420][T30353] should_fail_ex+0x3b0/0x50c [ 753.521670][T30353] __should_failslab+0xc8/0x128 [ 753.522901][T30353] should_failslab+0x10/0x28 [ 753.524112][T30353] __kmem_cache_alloc_node+0x80/0x368 [ 753.525516][T30353] __kmalloc+0xb8/0x1b8 [ 753.526698][T30353] tomoyo_realpath_from_path+0xc8/0x4cc [ 753.528145][T30353] tomoyo_check_open_permission+0x1ec/0x414 [ 753.529657][T30353] tomoyo_file_open+0x130/0x19c [ 753.530905][T30353] security_file_open+0x6c/0xb0 [ 753.532193][T30353] do_dentry_open+0x29c/0x12b4 [ 753.533546][T30353] vfs_open+0x7c/0x90 [ 753.534640][T30353] path_openat+0x1f6c/0x2888 00:12:33 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x10, 0x0) [ 753.535871][T30353] do_filp_open+0x1bc/0x3cc [ 753.537044][T30353] do_sys_openat2+0x124/0x1b8 [ 753.538260][T30353] __arm64_sys_openat+0x1f0/0x240 [ 753.539628][T30353] invoke_syscall+0x98/0x2b8 [ 753.540856][T30353] el0_svc_common+0x130/0x23c [ 753.542080][T30353] do_el0_svc+0x48/0x58 [ 753.543207][T30353] el0_svc+0x54/0x158 [ 753.544355][T30353] el0t_64_sync_handler+0x84/0xfc [ 753.545678][T30353] el0t_64_sync+0x190/0x194 [ 753.550219][T30352] CPU: 1 PID: 30352 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 753.552865][T30352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 753.555628][T30352] Call trace: [ 753.556507][T30352] dump_backtrace+0x1b8/0x1e4 [ 753.557827][T30352] show_stack+0x2c/0x44 [ 753.558946][T30352] dump_stack_lvl+0xd0/0x124 [ 753.560151][T30352] dump_stack+0x1c/0x28 [ 753.561215][T30352] should_fail_ex+0x3b0/0x50c [ 753.562459][T30352] __should_failslab+0xc8/0x128 [ 753.563746][T30352] should_failslab+0x10/0x28 [ 753.564963][T30352] kmem_cache_alloc+0x80/0x410 [ 753.566157][T30352] alloc_empty_file+0xac/0x1d4 [ 753.567420][T30352] path_openat+0xd0/0x2888 [ 753.568588][T30352] do_filp_open+0x1bc/0x3cc [ 753.569752][T30352] do_sys_openat2+0x124/0x1b8 [ 753.570959][T30352] __arm64_sys_openat+0x1f0/0x240 [ 753.572303][T30352] invoke_syscall+0x98/0x2b8 [ 753.573528][T30352] el0_svc_common+0x130/0x23c [ 753.574747][T30352] do_el0_svc+0x48/0x58 [ 753.575855][T30352] el0_svc+0x54/0x158 [ 753.576862][T30352] el0t_64_sync_handler+0x84/0xfc [ 753.578213][T30352] el0t_64_sync+0x190/0x194 [ 753.585703][T30353] ERROR: Out of memory at tomoyo_realpath_from_path. 00:12:33 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 4) 00:12:33 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x7000, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 1) [ 753.630617][T30369] FAULT_INJECTION: forcing a failure. [ 753.630617][T30369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 753.634262][T30369] CPU: 0 PID: 30369 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 753.636764][T30369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 753.639434][T30369] Call trace: [ 753.640282][T30369] dump_backtrace+0x1b8/0x1e4 [ 753.641585][T30369] show_stack+0x2c/0x44 [ 753.642652][T30369] dump_stack_lvl+0xd0/0x124 [ 753.643869][T30369] dump_stack+0x1c/0x28 [ 753.644880][T30369] should_fail_ex+0x3b0/0x50c [ 753.646075][T30369] should_fail+0x14/0x24 [ 753.647099][T30370] FAULT_INJECTION: forcing a failure. [ 753.647099][T30370] name failslab, interval 1, probability 0, space 0, times 0 [ 753.647166][T30369] should_fail_usercopy+0x20/0x30 [ 753.651841][T30369] copy_msghdr_from_user+0xb8/0x59c [ 753.653182][T30369] __sys_sendmsg+0x200/0x33c [ 753.654358][T30369] __arm64_sys_sendmsg+0x80/0x94 [ 753.655608][T30369] invoke_syscall+0x98/0x2b8 [ 753.656778][T30369] el0_svc_common+0x130/0x23c [ 753.657935][T30369] do_el0_svc+0x48/0x58 [ 753.659046][T30369] el0_svc+0x54/0x158 [ 753.660052][T30369] el0t_64_sync_handler+0x84/0xfc [ 753.661359][T30369] el0t_64_sync+0x190/0x194 [ 753.671800][T30370] CPU: 0 PID: 30370 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 753.674407][T30370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 753.676973][T30370] Call trace: [ 753.677811][T30370] dump_backtrace+0x1b8/0x1e4 [ 753.679069][T30370] show_stack+0x2c/0x44 [ 753.680145][T30370] dump_stack_lvl+0xd0/0x124 [ 753.681337][T30370] dump_stack+0x1c/0x28 [ 753.682370][T30370] should_fail_ex+0x3b0/0x50c [ 753.683582][T30370] __should_failslab+0xc8/0x128 [ 753.684758][T30370] should_failslab+0x10/0x28 [ 753.685943][T30370] kmem_cache_alloc+0x80/0x410 [ 753.687245][T30370] security_file_alloc+0x30/0x124 [ 753.688620][T30370] init_file+0x9c/0x220 [ 753.689686][T30370] alloc_empty_file+0xc0/0x1d4 [ 753.690894][T30370] path_openat+0xd0/0x2888 [ 753.692007][T30370] do_filp_open+0x1bc/0x3cc [ 753.693174][T30370] do_sys_openat2+0x124/0x1b8 [ 753.694464][T30370] __arm64_sys_openat+0x1f0/0x240 [ 753.695772][T30370] invoke_syscall+0x98/0x2b8 [ 753.696933][T30370] el0_svc_common+0x130/0x23c [ 753.698130][T30370] do_el0_svc+0x48/0x58 [ 753.699261][T30370] el0_svc+0x54/0x158 [ 753.700307][T30370] el0t_64_sync_handler+0x84/0xfc [ 753.701610][T30370] el0t_64_sync+0x190/0x194 00:12:34 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) 00:12:34 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x541b, 0x0) 00:12:34 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x1000000, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:34 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 6) 00:12:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 2) 00:12:34 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 5) [ 754.332079][T30375] FAULT_INJECTION: forcing a failure. [ 754.332079][T30375] name failslab, interval 1, probability 0, space 0, times 0 [ 754.339034][T30376] FAULT_INJECTION: forcing a failure. [ 754.339034][T30376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 754.339318][T30379] FAULT_INJECTION: forcing a failure. [ 754.339318][T30379] name failslab, interval 1, probability 0, space 0, times 0 [ 754.351609][T30375] CPU: 0 PID: 30375 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 754.354184][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 754.356641][T30375] Call trace: [ 754.357516][T30375] dump_backtrace+0x1b8/0x1e4 [ 754.358647][T30375] show_stack+0x2c/0x44 [ 754.359679][T30375] dump_stack_lvl+0xd0/0x124 [ 754.360868][T30375] dump_stack+0x1c/0x28 [ 754.361924][T30375] should_fail_ex+0x3b0/0x50c [ 754.363136][T30375] __should_failslab+0xc8/0x128 [ 754.364448][T30375] should_failslab+0x10/0x28 [ 754.365760][T30375] __kmem_cache_alloc_node+0x80/0x368 [ 754.367099][T30375] kmalloc_trace+0x3c/0x88 [ 754.368271][T30375] proc_thread_self_get_link+0x108/0x1a4 [ 754.369721][T30375] pick_link+0x530/0xb8c [ 754.370879][T30375] step_into+0x9fc/0xd1c [ 754.371979][T30375] link_path_walk+0x5dc/0xc5c [ 754.373160][T30375] path_openat+0x1cc/0x2888 [ 754.374394][T30375] do_filp_open+0x1bc/0x3cc [ 754.375525][T30375] do_sys_openat2+0x124/0x1b8 [ 754.376724][T30375] __arm64_sys_openat+0x1f0/0x240 [ 754.378027][T30375] invoke_syscall+0x98/0x2b8 [ 754.379211][T30375] el0_svc_common+0x130/0x23c [ 754.380370][T30375] do_el0_svc+0x48/0x58 [ 754.381454][T30375] el0_svc+0x54/0x158 [ 754.382491][T30375] el0t_64_sync_handler+0x84/0xfc [ 754.383807][T30375] el0t_64_sync+0x190/0x194 [ 754.384951][T30379] CPU: 1 PID: 30379 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 00:12:34 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x5421, 0x0) [ 754.387563][T30379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 754.390077][T30379] Call trace: [ 754.390916][T30379] dump_backtrace+0x1b8/0x1e4 [ 754.392237][T30379] show_stack+0x2c/0x44 [ 754.393315][T30379] dump_stack_lvl+0xd0/0x124 [ 754.394552][T30379] dump_stack+0x1c/0x28 [ 754.395650][T30379] should_fail_ex+0x3b0/0x50c [ 754.396829][T30379] __should_failslab+0xc8/0x128 [ 754.398012][T30379] should_failslab+0x10/0x28 [ 754.399167][T30379] __kmem_cache_alloc_node+0x80/0x368 [ 754.400559][T30379] __kmalloc+0xb8/0x1b8 [ 754.401642][T30379] tomoyo_encode+0x270/0x4b0 [ 754.402820][T30379] tomoyo_realpath_from_path+0x478/0x4cc [ 754.404289][T30379] tomoyo_check_open_permission+0x1ec/0x414 [ 754.405805][T30379] tomoyo_file_open+0x130/0x19c [ 754.406989][T30379] security_file_open+0x6c/0xb0 [ 754.408249][T30379] do_dentry_open+0x29c/0x12b4 [ 754.409459][T30379] vfs_open+0x7c/0x90 [ 754.410486][T30379] path_openat+0x1f6c/0x2888 [ 754.411630][T30379] do_filp_open+0x1bc/0x3cc [ 754.412759][T30379] do_sys_openat2+0x124/0x1b8 [ 754.413929][T30379] __arm64_sys_openat+0x1f0/0x240 [ 754.415255][T30379] invoke_syscall+0x98/0x2b8 [ 754.416406][T30379] el0_svc_common+0x130/0x23c [ 754.417726][T30379] do_el0_svc+0x48/0x58 [ 754.418768][T30379] el0_svc+0x54/0x158 [ 754.419787][T30379] el0t_64_sync_handler+0x84/0xfc [ 754.421124][T30379] el0t_64_sync+0x190/0x194 [ 754.422283][T30376] CPU: 0 PID: 30376 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 754.424827][T30376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 754.427461][T30376] Call trace: [ 754.428322][T30376] dump_backtrace+0x1b8/0x1e4 [ 754.429578][T30376] show_stack+0x2c/0x44 [ 754.430613][T30376] dump_stack_lvl+0xd0/0x124 [ 754.431757][T30376] dump_stack+0x1c/0x28 [ 754.432904][T30376] should_fail_ex+0x3b0/0x50c [ 754.434116][T30376] should_fail+0x14/0x24 [ 754.435245][T30376] should_fail_usercopy+0x20/0x30 [ 754.436558][T30376] move_addr_to_kernel+0xa8/0x270 [ 754.437839][T30376] copy_msghdr_from_user+0x474/0x59c [ 754.438990][T30379] ERROR: Out of memory at tomoyo_realpath_from_path. [ 754.439245][T30376] __sys_sendmsg+0x200/0x33c [ 754.442118][T30376] __arm64_sys_sendmsg+0x80/0x94 [ 754.443396][T30376] invoke_syscall+0x98/0x2b8 [ 754.444602][T30376] el0_svc_common+0x130/0x23c [ 754.445801][T30376] do_el0_svc+0x48/0x58 [ 754.446940][T30376] el0_svc+0x54/0x158 [ 754.448010][T30376] el0t_64_sync_handler+0x84/0xfc [ 754.449372][T30376] el0t_64_sync+0x190/0x194 00:12:34 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x5450, 0x0) 00:12:34 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x70000000, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:34 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 6) 00:12:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 3) 00:12:34 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 7) [ 754.499770][T30393] FAULT_INJECTION: forcing a failure. [ 754.499770][T30393] name failslab, interval 1, probability 0, space 0, times 0 [ 754.509001][T30393] CPU: 1 PID: 30393 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 754.511645][T30393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 754.513471][T30394] FAULT_INJECTION: forcing a failure. [ 754.513471][T30394] name failslab, interval 1, probability 0, space 0, times 0 [ 754.514072][T30393] Call trace: [ 754.514080][T30393] dump_backtrace+0x1b8/0x1e4 [ 754.514096][T30393] show_stack+0x2c/0x44 [ 754.514105][T30393] dump_stack_lvl+0xd0/0x124 [ 754.521426][T30393] dump_stack+0x1c/0x28 [ 754.522483][T30393] should_fail_ex+0x3b0/0x50c [ 754.523737][T30393] __should_failslab+0xc8/0x128 [ 754.524971][T30393] should_failslab+0x10/0x28 [ 754.526148][T30393] slab_pre_alloc_hook+0x6c/0x32c [ 754.527427][T30393] kmem_cache_alloc_lru+0x54/0x394 [ 754.528758][T30393] __d_alloc+0x40/0x6ac [ 754.529796][T30393] d_alloc_parallel+0xb8/0x1184 [ 754.531028][T30393] __lookup_slow+0x108/0x374 [ 754.532176][T30393] lookup_slow+0x60/0x84 [ 754.533282][T30393] link_path_walk+0x7c8/0xc5c [ 754.534521][T30393] path_openat+0x1cc/0x2888 [ 754.535745][T30393] do_filp_open+0x1bc/0x3cc [ 754.536888][T30393] do_sys_openat2+0x124/0x1b8 [ 754.538099][T30393] __arm64_sys_openat+0x1f0/0x240 [ 754.539401][T30393] invoke_syscall+0x98/0x2b8 [ 754.540550][T30393] el0_svc_common+0x130/0x23c [ 754.541776][T30393] do_el0_svc+0x48/0x58 [ 754.542837][T30393] el0_svc+0x54/0x158 [ 754.543860][T30393] el0t_64_sync_handler+0x84/0xfc [ 754.545134][T30393] el0t_64_sync+0x190/0x194 [ 754.546237][T30394] CPU: 0 PID: 30394 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 754.548869][T30394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 754.551520][T30394] Call trace: [ 754.552383][T30394] dump_backtrace+0x1b8/0x1e4 [ 754.553580][T30394] show_stack+0x2c/0x44 [ 754.554621][T30394] dump_stack_lvl+0xd0/0x124 [ 754.555813][T30394] dump_stack+0x1c/0x28 [ 754.556868][T30394] should_fail_ex+0x3b0/0x50c [ 754.558087][T30394] __should_failslab+0xc8/0x128 [ 754.559369][T30394] should_failslab+0x10/0x28 [ 754.560559][T30394] kmem_cache_alloc_node+0x84/0x458 [ 754.561950][T30394] __alloc_skb+0x19c/0x3d8 [ 754.563133][T30394] netlink_sendmsg+0x634/0xb20 [ 754.564361][T30394] ____sys_sendmsg+0x56c/0x840 [ 754.565571][T30394] __sys_sendmsg+0x26c/0x33c [ 754.566725][T30394] __arm64_sys_sendmsg+0x80/0x94 [ 754.568032][T30394] invoke_syscall+0x98/0x2b8 [ 754.569155][T30394] el0_svc_common+0x130/0x23c [ 754.570380][T30394] do_el0_svc+0x48/0x58 [ 754.571430][T30394] el0_svc+0x54/0x158 [ 754.572460][T30394] el0t_64_sync_handler+0x84/0xfc [ 754.573774][T30394] el0t_64_sync+0x190/0x194 [ 754.576126][T30397] FAULT_INJECTION: forcing a failure. [ 754.576126][T30397] name failslab, interval 1, probability 0, space 0, times 0 [ 754.579546][T30397] CPU: 0 PID: 30397 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 754.582125][T30397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 754.584660][T30397] Call trace: [ 754.585541][T30397] dump_backtrace+0x1b8/0x1e4 [ 754.586784][T30397] show_stack+0x2c/0x44 [ 754.587809][T30397] dump_stack_lvl+0xd0/0x124 [ 754.588941][T30397] dump_stack+0x1c/0x28 [ 754.590059][T30397] should_fail_ex+0x3b0/0x50c [ 754.591270][T30397] __should_failslab+0xc8/0x128 [ 754.592571][T30397] should_failslab+0x10/0x28 [ 754.593805][T30397] __kmem_cache_alloc_node+0x80/0x368 [ 754.595200][T30397] kmalloc_trace+0x3c/0x88 [ 754.596310][T30397] virtual_ncidev_open+0x5c/0x1bc [ 754.597608][T30397] misc_open+0x2f0/0x368 [ 754.598690][T30397] chrdev_open+0x3c8/0x4dc [ 754.599895][T30397] do_dentry_open+0x778/0x12b4 [ 754.601231][T30397] vfs_open+0x7c/0x90 [ 754.602281][T30397] path_openat+0x1f6c/0x2888 [ 754.603476][T30397] do_filp_open+0x1bc/0x3cc [ 754.604673][T30397] do_sys_openat2+0x124/0x1b8 [ 754.605882][T30397] __arm64_sys_openat+0x1f0/0x240 [ 754.607210][T30397] invoke_syscall+0x98/0x2b8 [ 754.608357][T30397] el0_svc_common+0x130/0x23c [ 754.609587][T30397] do_el0_svc+0x48/0x58 [ 754.610708][T30397] el0_svc+0x54/0x158 [ 754.611749][T30397] el0t_64_sync_handler+0x84/0xfc [ 754.613067][T30397] el0t_64_sync+0x190/0x194 00:12:35 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x2, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) 00:12:35 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x5451, 0x0) 00:12:35 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x100000000000000, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 4) 00:12:35 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 7) 00:12:35 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 8) 00:12:35 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x5452, 0x0) [ 755.264335][T30405] FAULT_INJECTION: forcing a failure. [ 755.264335][T30405] name failslab, interval 1, probability 0, space 0, times 0 [ 755.267554][T30405] CPU: 0 PID: 30405 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 755.270040][T30405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 755.272653][T30405] Call trace: [ 755.273483][T30405] dump_backtrace+0x1b8/0x1e4 [ 755.274694][T30405] show_stack+0x2c/0x44 [ 755.275794][T30405] dump_stack_lvl+0xd0/0x124 [ 755.277029][T30405] dump_stack+0x1c/0x28 [ 755.278126][T30405] should_fail_ex+0x3b0/0x50c [ 755.279289][T30405] __should_failslab+0xc8/0x128 [ 755.280567][T30405] should_failslab+0x10/0x28 [ 755.281796][T30405] slab_pre_alloc_hook+0x6c/0x32c [ 755.283116][T30405] kmem_cache_alloc_lru+0x54/0x394 [ 755.284476][T30405] proc_alloc_inode+0x2c/0xb8 [ 755.285670][T30405] new_inode_pseudo+0x68/0x1d0 [ 755.286943][T30405] new_inode+0x30/0x16c [ 755.288013][T30405] proc_pid_make_inode+0x30/0x144 [ 755.289394][T30405] proc_pident_instantiate+0x70/0x270 [ 755.290803][T30405] proc_tid_base_lookup+0x16c/0x1b4 [ 755.292152][T30405] __lookup_slow+0x250/0x374 [ 755.293417][T30405] lookup_slow+0x60/0x84 [ 755.294553][T30405] link_path_walk+0x7c8/0xc5c [ 755.295737][T30405] path_openat+0x1cc/0x2888 [ 755.296920][T30405] do_filp_open+0x1bc/0x3cc [ 755.298074][T30405] do_sys_openat2+0x124/0x1b8 [ 755.299324][T30405] __arm64_sys_openat+0x1f0/0x240 [ 755.300635][T30405] invoke_syscall+0x98/0x2b8 [ 755.301847][T30405] el0_svc_common+0x130/0x23c [ 755.303072][T30405] do_el0_svc+0x48/0x58 [ 755.304119][T30405] el0_svc+0x54/0x158 [ 755.305185][T30405] el0t_64_sync_handler+0x84/0xfc [ 755.306489][T30405] el0t_64_sync+0x190/0x194 [ 755.311561][T30411] FAULT_INJECTION: forcing a failure. [ 755.311561][T30411] name failslab, interval 1, probability 0, space 0, times 0 [ 755.317381][T30411] CPU: 0 PID: 30411 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 755.319935][T30411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 755.322545][T30411] Call trace: [ 755.323379][T30411] dump_backtrace+0x1b8/0x1e4 [ 755.324602][T30411] show_stack+0x2c/0x44 [ 755.325691][T30411] dump_stack_lvl+0xd0/0x124 [ 755.326885][T30411] dump_stack+0x1c/0x28 [ 755.327953][T30411] should_fail_ex+0x3b0/0x50c [ 755.329163][T30411] __should_failslab+0xc8/0x128 [ 755.330469][T30411] should_failslab+0x10/0x28 [ 755.331680][T30411] __kmem_cache_alloc_node+0x80/0x368 [ 755.333110][T30411] kmalloc_trace+0x3c/0x88 [ 755.334264][T30411] nci_allocate_device+0xec/0x324 [ 755.335565][T30411] virtual_ncidev_open+0x84/0x1bc [ 755.336867][T30411] misc_open+0x2f0/0x368 [ 755.338006][T30411] chrdev_open+0x3c8/0x4dc [ 755.339202][T30411] do_dentry_open+0x778/0x12b4 [ 755.340473][T30411] vfs_open+0x7c/0x90 [ 755.341564][T30411] path_openat+0x1f6c/0x2888 [ 755.342774][T30411] do_filp_open+0x1bc/0x3cc [ 755.343996][T30411] do_sys_openat2+0x124/0x1b8 [ 755.345240][T30411] __arm64_sys_openat+0x1f0/0x240 [ 755.346558][T30411] invoke_syscall+0x98/0x2b8 [ 755.347752][T30411] el0_svc_common+0x130/0x23c [ 755.348988][T30411] do_el0_svc+0x48/0x58 [ 755.350056][T30411] el0_svc+0x54/0x158 [ 755.351084][T30411] el0t_64_sync_handler+0x84/0xfc [ 755.352393][T30411] el0t_64_sync+0x190/0x194 00:12:35 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x7000000000000000, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:35 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x5460, 0x0) 00:12:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 5) 00:12:35 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x8933, 0x0) 00:12:35 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 8) [ 755.389058][T30418] FAULT_INJECTION: forcing a failure. [ 755.389058][T30418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.405847][T30418] CPU: 1 PID: 30418 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 755.408206][T30418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 755.410776][T30418] Call trace: [ 755.411633][T30418] dump_backtrace+0x1b8/0x1e4 [ 755.412856][T30418] show_stack+0x2c/0x44 [ 755.413922][T30418] dump_stack_lvl+0xd0/0x124 [ 755.415133][T30418] dump_stack+0x1c/0x28 [ 755.416204][T30418] should_fail_ex+0x3b0/0x50c [ 755.417429][T30418] should_fail+0x14/0x24 [ 755.418531][T30418] should_fail_usercopy+0x20/0x30 [ 755.419819][T30418] _copy_from_iter+0x190/0x1500 [ 755.421097][T30418] netlink_sendmsg+0x704/0xb20 [ 755.422298][T30418] ____sys_sendmsg+0x56c/0x840 [ 755.423535][T30418] __sys_sendmsg+0x26c/0x33c [ 755.424724][T30418] __arm64_sys_sendmsg+0x80/0x94 [ 755.425979][T30418] invoke_syscall+0x98/0x2b8 [ 755.425997][T30421] FAULT_INJECTION: forcing a failure. [ 755.425997][T30421] name failslab, interval 1, probability 0, space 0, times 0 [ 755.427109][T30418] el0_svc_common+0x130/0x23c [ 755.427122][T30418] do_el0_svc+0x48/0x58 [ 755.427135][T30418] el0_svc+0x54/0x158 [ 755.433533][T30418] el0t_64_sync_handler+0x84/0xfc [ 755.434762][T30418] el0t_64_sync+0x190/0x194 [ 755.435932][T30421] CPU: 0 PID: 30421 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 755.438467][T30421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 755.440954][T30421] Call trace: [ 755.441744][T30421] dump_backtrace+0x1b8/0x1e4 [ 755.442873][T30421] show_stack+0x2c/0x44 [ 755.444001][T30421] dump_stack_lvl+0xd0/0x124 [ 755.445190][T30421] dump_stack+0x1c/0x28 [ 755.446380][T30421] should_fail_ex+0x3b0/0x50c [ 755.447575][T30421] __should_failslab+0xc8/0x128 [ 755.448822][T30421] should_failslab+0x10/0x28 [ 755.449996][T30421] kmem_cache_alloc+0x80/0x410 [ 755.451265][T30421] security_inode_alloc+0x30/0x124 [ 755.452595][T30421] inode_init_always+0x6b0/0xb24 [ 755.453889][T30421] new_inode_pseudo+0x7c/0x1d0 [ 755.455098][T30421] new_inode+0x30/0x16c [ 755.456184][T30421] proc_pid_make_inode+0x30/0x144 [ 755.457460][T30421] proc_pident_instantiate+0x70/0x270 [ 755.458893][T30421] proc_tid_base_lookup+0x16c/0x1b4 [ 755.460210][T30421] __lookup_slow+0x250/0x374 [ 755.461412][T30421] lookup_slow+0x60/0x84 [ 755.462491][T30421] link_path_walk+0x7c8/0xc5c [ 755.463719][T30421] path_openat+0x1cc/0x2888 [ 755.464907][T30421] do_filp_open+0x1bc/0x3cc [ 755.466085][T30421] do_sys_openat2+0x124/0x1b8 [ 755.467295][T30421] __arm64_sys_openat+0x1f0/0x240 [ 755.468557][T30421] invoke_syscall+0x98/0x2b8 [ 755.469759][T30421] el0_svc_common+0x130/0x23c [ 755.470988][T30421] do_el0_svc+0x48/0x58 [ 755.472062][T30421] el0_svc+0x54/0x158 [ 755.473047][T30421] el0t_64_sync_handler+0x84/0xfc [ 755.474355][T30421] el0t_64_sync+0x190/0x194 00:12:36 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x2000000, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x0) 00:12:36 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 9) 00:12:36 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xb701, 0x0) 00:12:36 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0xffff80009ddcffff, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 6) 00:12:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 9) 00:12:36 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xb702, 0x0) [ 756.112418][T30424] FAULT_INJECTION: forcing a failure. [ 756.112418][T30424] name failslab, interval 1, probability 0, space 0, times 0 [ 756.118133][T30430] FAULT_INJECTION: forcing a failure. [ 756.118133][T30430] name failslab, interval 1, probability 0, space 0, times 0 [ 756.122442][T30430] CPU: 1 PID: 30430 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 756.125021][T30430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 756.127500][T30430] Call trace: [ 756.128302][T30430] dump_backtrace+0x1b8/0x1e4 [ 756.129519][T30430] show_stack+0x2c/0x44 [ 756.130602][T30430] dump_stack_lvl+0xd0/0x124 [ 756.131778][T30430] dump_stack+0x1c/0x28 [ 756.132828][T30430] should_fail_ex+0x3b0/0x50c [ 756.134053][T30430] __should_failslab+0xc8/0x128 [ 756.135293][T30430] should_failslab+0x10/0x28 [ 756.136496][T30430] kmem_cache_alloc_node+0x84/0x458 [ 756.137789][T30430] __alloc_skb+0x19c/0x3d8 [ 756.138917][T30430] netlink_ack+0x2f4/0xf20 [ 756.140071][T30430] netlink_rcv_skb+0x1f4/0x3c4 [ 756.141284][T30430] genl_rcv+0x38/0x50 [ 756.142274][T30430] netlink_unicast+0x65c/0x898 [ 756.143563][T30430] netlink_sendmsg+0x83c/0xb20 [ 756.144739][T30430] ____sys_sendmsg+0x56c/0x840 [ 756.145926][T30430] __sys_sendmsg+0x26c/0x33c [ 756.147098][T30430] __arm64_sys_sendmsg+0x80/0x94 [ 756.148342][T30430] invoke_syscall+0x98/0x2b8 [ 756.149461][T30430] el0_svc_common+0x130/0x23c [ 756.150636][T30430] do_el0_svc+0x48/0x58 [ 756.151687][T30430] el0_svc+0x54/0x158 [ 756.152731][T30430] el0t_64_sync_handler+0x84/0xfc [ 756.153866][T30429] FAULT_INJECTION: forcing a failure. [ 756.153866][T30429] name failslab, interval 1, probability 0, space 0, times 0 [ 756.154019][T30430] el0t_64_sync+0x190/0x194 [ 756.158266][T30429] CPU: 0 PID: 30429 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 756.160736][T30429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 756.163267][T30429] Call trace: [ 756.164089][T30429] dump_backtrace+0x1b8/0x1e4 [ 756.165274][T30429] show_stack+0x2c/0x44 [ 756.166370][T30429] dump_stack_lvl+0xd0/0x124 [ 756.167555][T30429] dump_stack+0x1c/0x28 [ 756.168666][T30429] should_fail_ex+0x3b0/0x50c [ 756.169894][T30429] __should_failslab+0xc8/0x128 [ 756.171159][T30429] should_failslab+0x10/0x28 [ 756.172331][T30429] __kmem_cache_alloc_node+0x80/0x368 [ 756.173704][T30429] kmalloc_trace+0x3c/0x88 [ 756.174813][T30429] nfc_allocate_device+0x124/0x45c [ 756.176123][T30429] nci_allocate_device+0x1ac/0x324 [ 756.177413][T30429] virtual_ncidev_open+0x84/0x1bc [ 756.178722][T30429] misc_open+0x2f0/0x368 [ 756.179872][T30429] chrdev_open+0x3c8/0x4dc [ 756.181034][T30429] do_dentry_open+0x778/0x12b4 [ 756.182273][T30429] vfs_open+0x7c/0x90 [ 756.183289][T30429] path_openat+0x1f6c/0x2888 [ 756.184472][T30429] do_filp_open+0x1bc/0x3cc [ 756.185642][T30429] do_sys_openat2+0x124/0x1b8 [ 756.186852][T30429] __arm64_sys_openat+0x1f0/0x240 [ 756.188139][T30429] invoke_syscall+0x98/0x2b8 [ 756.189340][T30429] el0_svc_common+0x130/0x23c [ 756.190607][T30429] do_el0_svc+0x48/0x58 [ 756.191714][T30429] el0_svc+0x54/0x158 [ 756.192758][T30429] el0t_64_sync_handler+0x84/0xfc [ 756.194094][T30429] el0t_64_sync+0x190/0x194 00:12:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 7) [ 756.202245][T30424] CPU: 0 PID: 30424 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 756.204772][T30424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 756.207422][T30424] Call trace: [ 756.208255][T30424] dump_backtrace+0x1b8/0x1e4 [ 756.209450][T30424] show_stack+0x2c/0x44 [ 756.210573][T30424] dump_stack_lvl+0xd0/0x124 [ 756.211850][T30424] dump_stack+0x1c/0x28 [ 756.212900][T30424] should_fail_ex+0x3b0/0x50c [ 756.214106][T30424] __should_failslab+0xc8/0x128 [ 756.215417][T30424] should_failslab+0x10/0x28 [ 756.216656][T30424] slab_pre_alloc_hook+0x6c/0x32c [ 756.218008][T30424] kmem_cache_alloc_lru+0x54/0x394 [ 756.219361][T30424] __d_alloc+0x40/0x6ac [ 756.220451][T30424] d_alloc_parallel+0xb8/0x1184 [ 756.221747][T30424] path_openat+0x6f0/0x2888 [ 756.222923][T30424] do_filp_open+0x1bc/0x3cc [ 756.224143][T30424] do_sys_openat2+0x124/0x1b8 [ 756.225356][T30424] __arm64_sys_openat+0x1f0/0x240 [ 756.226674][T30424] invoke_syscall+0x98/0x2b8 [ 756.227873][T30424] el0_svc_common+0x130/0x23c [ 756.229123][T30424] do_el0_svc+0x48/0x58 [ 756.230233][T30424] el0_svc+0x54/0x158 [ 756.231301][T30424] el0t_64_sync_handler+0x84/0xfc [ 756.232610][T30424] el0t_64_sync+0x190/0x194 00:12:36 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0xffffdc9d0080ffff, &(0x7f00000000c0)={0x0, 0x100087}, 0x20) 00:12:36 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xb703, 0x0) 00:12:36 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 10) 00:12:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 10) [ 756.299856][T30443] FAULT_INJECTION: forcing a failure. [ 756.299856][T30443] name failslab, interval 1, probability 0, space 0, times 0 [ 756.303287][T30445] FAULT_INJECTION: forcing a failure. [ 756.303287][T30445] name failslab, interval 1, probability 0, space 0, times 0 [ 756.306343][T30443] CPU: 0 PID: 30443 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 756.308875][T30443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 756.311446][T30443] Call trace: [ 756.312359][T30443] dump_backtrace+0x1b8/0x1e4 [ 756.313607][T30443] show_stack+0x2c/0x44 [ 756.314700][T30443] dump_stack_lvl+0xd0/0x124 [ 756.315937][T30443] dump_stack+0x1c/0x28 [ 756.317032][T30443] should_fail_ex+0x3b0/0x50c [ 756.318232][T30443] __should_failslab+0xc8/0x128 [ 756.319520][T30443] should_failslab+0x10/0x28 [ 756.320708][T30443] slab_pre_alloc_hook+0x6c/0x32c [ 756.322071][T30443] kmem_cache_alloc_lru+0x54/0x394 [ 756.323393][T30443] proc_alloc_inode+0x2c/0xb8 [ 756.324584][T30443] new_inode_pseudo+0x68/0x1d0 [ 756.325800][T30443] new_inode+0x30/0x16c [ 756.326874][T30443] proc_pid_make_inode+0x30/0x144 [ 756.328206][T30443] proc_ns_dir_lookup+0x19c/0x268 [ 756.329524][T30443] path_openat+0xc90/0x2888 [ 756.330643][T30443] do_filp_open+0x1bc/0x3cc [ 756.331833][T30443] do_sys_openat2+0x124/0x1b8 [ 756.333006][T30443] __arm64_sys_openat+0x1f0/0x240 [ 756.334278][T30443] invoke_syscall+0x98/0x2b8 [ 756.335458][T30443] el0_svc_common+0x130/0x23c [ 756.336677][T30443] do_el0_svc+0x48/0x58 [ 756.337802][T30443] el0_svc+0x54/0x158 [ 756.338809][T30443] el0t_64_sync_handler+0x84/0xfc [ 756.340060][T30443] el0t_64_sync+0x190/0x194 [ 756.341369][T30445] CPU: 1 PID: 30445 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 756.343927][T30445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 756.346517][T30445] Call trace: [ 756.347363][T30445] dump_backtrace+0x1b8/0x1e4 [ 756.348643][T30445] show_stack+0x2c/0x44 [ 756.349723][T30445] dump_stack_lvl+0xd0/0x124 [ 756.350920][T30445] dump_stack+0x1c/0x28 [ 756.351952][T30445] should_fail_ex+0x3b0/0x50c [ 756.353171][T30445] __should_failslab+0xc8/0x128 [ 756.354373][T30445] should_failslab+0x10/0x28 [ 756.355580][T30445] __kmem_cache_alloc_node+0x80/0x368 [ 756.356954][T30445] __kmalloc_node_track_caller+0xbc/0x1c0 [ 756.358377][T30445] kvasprintf+0x108/0x1dc [ 756.359522][T30445] kvasprintf_const+0xdc/0x230 [ 756.360710][T30445] kobject_set_name_vargs+0xd0/0x1b8 [ 756.362054][T30445] dev_set_name+0xe0/0x12c [ 756.363164][T30445] nfc_allocate_device+0x1a0/0x45c [ 756.364494][T30445] nci_allocate_device+0x1ac/0x324 [ 756.365799][T30445] virtual_ncidev_open+0x84/0x1bc [ 756.367136][T30445] misc_open+0x2f0/0x368 [ 756.368212][T30445] chrdev_open+0x3c8/0x4dc [ 756.369334][T30445] do_dentry_open+0x778/0x12b4 [ 756.370544][T30445] vfs_open+0x7c/0x90 [ 756.371578][T30445] path_openat+0x1f6c/0x2888 [ 756.372742][T30445] do_filp_open+0x1bc/0x3cc [ 756.373914][T30445] do_sys_openat2+0x124/0x1b8 [ 756.375088][T30445] __arm64_sys_openat+0x1f0/0x240 [ 756.376356][T30445] invoke_syscall+0x98/0x2b8 [ 756.377558][T30445] el0_svc_common+0x130/0x23c [ 756.378787][T30445] do_el0_svc+0x48/0x58 [ 756.379841][T30445] el0_svc+0x54/0x158 [ 756.380870][T30445] el0t_64_sync_handler+0x84/0xfc [ 756.382181][T30445] el0t_64_sync+0x190/0x194 00:12:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) (fail_nth: 8) 00:12:36 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0xb704, 0x0) 00:12:36 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x70, 0x100087}, 0x20) 00:12:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 11) 00:12:36 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0, 0x2}], 0x1}, 0x0) 00:12:36 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 11) [ 757.017742][T30450] FAULT_INJECTION: forcing a failure. [ 757.017742][T30450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 757.023252][T30453] FAULT_INJECTION: forcing a failure. [ 757.023252][T30453] name failslab, interval 1, probability 0, space 0, times 0 [ 757.026462][T30453] CPU: 1 PID: 30453 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 757.028998][T30453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 757.031566][T30453] Call trace: [ 757.032405][T30453] dump_backtrace+0x1b8/0x1e4 [ 757.033679][T30453] show_stack+0x2c/0x44 [ 757.034781][T30453] dump_stack_lvl+0xd0/0x124 [ 757.035956][T30453] dump_stack+0x1c/0x28 [ 757.037030][T30453] should_fail_ex+0x3b0/0x50c [ 757.038257][T30453] __should_failslab+0xc8/0x128 [ 757.039430][T30453] should_failslab+0x10/0x28 [ 757.040590][T30453] kmem_cache_alloc+0x80/0x410 [ 757.041741][T30453] security_inode_alloc+0x30/0x124 [ 757.042942][T30457] FAULT_INJECTION: forcing a failure. [ 757.042942][T30457] name failslab, interval 1, probability 0, space 0, times 0 [ 757.043032][T30453] inode_init_always+0x6b0/0xb24 [ 757.047614][T30453] new_inode_pseudo+0x7c/0x1d0 [ 757.048736][T30453] new_inode+0x30/0x16c [ 757.049904][T30453] proc_pid_make_inode+0x30/0x144 [ 757.051243][T30453] proc_ns_dir_lookup+0x19c/0x268 [ 757.052536][T30453] path_openat+0xc90/0x2888 [ 757.053691][T30453] do_filp_open+0x1bc/0x3cc [ 757.054892][T30453] do_sys_openat2+0x124/0x1b8 [ 757.056122][T30453] __arm64_sys_openat+0x1f0/0x240 [ 757.057435][T30453] invoke_syscall+0x98/0x2b8 [ 757.058636][T30453] el0_svc_common+0x130/0x23c 00:12:37 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x7000, 0x100087}, 0x20) [ 757.059848][T30453] do_el0_svc+0x48/0x58 [ 757.060890][T30453] el0_svc+0x54/0x158 [ 757.061983][T30453] el0t_64_sync_handler+0x84/0xfc [ 757.063283][T30453] el0t_64_sync+0x190/0x194 [ 757.066038][T30457] CPU: 0 PID: 30457 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 757.068617][T30457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 757.071244][T30457] Call trace: [ 757.072075][T30457] dump_backtrace+0x1b8/0x1e4 [ 757.073192][T30457] show_stack+0x2c/0x44 [ 757.074211][T30457] dump_stack_lvl+0xd0/0x124 [ 757.075384][T30457] dump_stack+0x1c/0x28 [ 757.076471][T30457] should_fail_ex+0x3b0/0x50c [ 757.077668][T30457] __should_failslab+0xc8/0x128 [ 757.078867][T30457] should_failslab+0x10/0x28 [ 757.080059][T30457] __kmem_cache_alloc_node+0x80/0x368 [ 757.081446][T30457] kmalloc_trace+0x3c/0x88 [ 757.082555][T30457] nci_hci_allocate+0x58/0x248 [ 757.083823][T30457] nci_allocate_device+0x1d4/0x324 [ 757.085070][T30457] virtual_ncidev_open+0x84/0x1bc [ 757.086308][T30457] misc_open+0x2f0/0x368 [ 757.087387][T30457] chrdev_open+0x3c8/0x4dc [ 757.088543][T30457] do_dentry_open+0x778/0x12b4 [ 757.089727][T30457] vfs_open+0x7c/0x90 [ 757.090691][T30457] path_openat+0x1f6c/0x2888 [ 757.091865][T30457] do_filp_open+0x1bc/0x3cc [ 757.093037][T30457] do_sys_openat2+0x124/0x1b8 [ 757.094250][T30457] __arm64_sys_openat+0x1f0/0x240 [ 757.095569][T30457] invoke_syscall+0x98/0x2b8 [ 757.096712][T30457] el0_svc_common+0x130/0x23c [ 757.097883][T30457] do_el0_svc+0x48/0x58 [ 757.098948][T30457] el0_svc+0x54/0x158 [ 757.099930][T30457] el0t_64_sync_handler+0x84/0xfc [ 757.101203][T30457] el0t_64_sync+0x190/0x194 [ 757.102338][T30450] CPU: 1 PID: 30450 Comm: syz-executor.0 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 757.104859][T30450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 757.107402][T30450] Call trace: [ 757.108254][T30450] dump_backtrace+0x1b8/0x1e4 [ 757.109467][T30450] show_stack+0x2c/0x44 [ 757.110562][T30450] dump_stack_lvl+0xd0/0x124 [ 757.111701][T30450] dump_stack+0x1c/0x28 [ 757.112740][T30450] should_fail_ex+0x3b0/0x50c [ 757.113952][T30450] should_fail+0x14/0x24 [ 757.115055][T30450] should_fail_usercopy+0x20/0x30 [ 757.116313][T30450] simple_read_from_buffer+0xd4/0x248 [ 757.117599][T30450] proc_fail_nth_read+0x134/0x1a0 [ 757.118916][T30450] vfs_read+0x284/0x8a4 [ 757.119978][T30450] ksys_read+0x15c/0x26c [ 757.121106][T30450] __arm64_sys_read+0x7c/0x90 [ 757.122308][T30450] invoke_syscall+0x98/0x2b8 [ 757.123440][T30450] el0_svc_common+0x130/0x23c [ 757.124660][T30450] do_el0_svc+0x48/0x58 [ 757.125718][T30450] el0_svc+0x54/0x158 [ 757.126727][T30450] el0t_64_sync_handler+0x84/0xfc [ 757.128029][T30450] el0t_64_sync+0x190/0x194 00:12:37 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x400448c9, 0x0) 00:12:37 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x1000000, 0x100087}, 0x20) 00:12:37 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 12) 00:12:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 00:12:37 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 12) 00:12:37 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x70000000, 0x100087}, 0x20) 00:12:37 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x400448dd, 0x0) [ 757.209537][T30473] FAULT_INJECTION: forcing a failure. [ 757.209537][T30473] name failslab, interval 1, probability 0, space 0, times 0 00:12:37 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x100000000000000, 0x100087}, 0x20) [ 757.225980][T30473] CPU: 1 PID: 30473 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 757.226801][T30475] FAULT_INJECTION: forcing a failure. [ 757.226801][T30475] name failslab, interval 1, probability 0, space 0, times 0 [ 757.228542][T30473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 757.228555][T30473] Call trace: [ 757.228559][T30473] dump_backtrace+0x1b8/0x1e4 [ 757.228575][T30473] show_stack+0x2c/0x44 [ 757.228584][T30473] dump_stack_lvl+0xd0/0x124 [ 757.238783][T30473] dump_stack+0x1c/0x28 [ 757.239838][T30473] should_fail_ex+0x3b0/0x50c [ 757.241064][T30473] __should_failslab+0xc8/0x128 [ 757.242341][T30473] should_failslab+0x10/0x28 [ 757.243536][T30473] slab_pre_alloc_hook+0x6c/0x32c 00:12:37 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x400454ca, 0x0) [ 757.244885][T30473] kmem_cache_alloc_lru+0x54/0x394 [ 757.246308][T30473] new_inode_pseudo+0xe0/0x1d0 [ 757.247556][T30473] __ns_get_path+0x23c/0x540 [ 757.248758][T30473] ns_get_path+0x64/0xac [ 757.249852][T30473] proc_ns_get_link+0xf4/0x194 [ 757.251163][T30473] pick_link+0x530/0xb8c [ 757.252356][T30473] step_into+0x9fc/0xd1c [ 757.253436][T30473] path_openat+0x1384/0x2888 [ 757.254621][T30473] do_filp_open+0x1bc/0x3cc [ 757.255818][T30473] do_sys_openat2+0x124/0x1b8 [ 757.257066][T30473] __arm64_sys_openat+0x1f0/0x240 [ 757.258380][T30473] invoke_syscall+0x98/0x2b8 [ 757.259634][T30473] el0_svc_common+0x130/0x23c [ 757.260910][T30473] do_el0_svc+0x48/0x58 [ 757.261984][T30473] el0_svc+0x54/0x158 [ 757.263026][T30473] el0t_64_sync_handler+0x84/0xfc [ 757.264276][T30473] el0t_64_sync+0x190/0x194 [ 757.269006][T30475] CPU: 0 PID: 30475 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 757.271695][T30475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 757.274304][T30475] Call trace: [ 757.275153][T30475] dump_backtrace+0x1b8/0x1e4 [ 757.276374][T30475] show_stack+0x2c/0x44 [ 757.277453][T30475] dump_stack_lvl+0xd0/0x124 [ 757.278701][T30475] dump_stack+0x1c/0x28 [ 757.279773][T30475] should_fail_ex+0x3b0/0x50c [ 757.280998][T30475] __should_failslab+0xc8/0x128 [ 757.282268][T30475] should_failslab+0x10/0x28 [ 757.283478][T30475] __kmem_cache_alloc_node+0x80/0x368 [ 757.284835][T30475] kmalloc_trace+0x3c/0x88 [ 757.285888][T30475] alloc_workqueue+0x15c/0xf70 [ 757.287168][T30475] nci_register_device+0x1ec/0x7c4 [ 757.288565][T30475] virtual_ncidev_open+0x13c/0x1bc [ 757.289903][T30475] misc_open+0x2f0/0x368 [ 757.291016][T30475] chrdev_open+0x3c8/0x4dc [ 757.292171][T30475] do_dentry_open+0x778/0x12b4 [ 757.293451][T30475] vfs_open+0x7c/0x90 [ 757.294499][T30475] path_openat+0x1f6c/0x2888 [ 757.295601][T30475] do_filp_open+0x1bc/0x3cc [ 757.296785][T30475] do_sys_openat2+0x124/0x1b8 [ 757.297973][T30475] __arm64_sys_openat+0x1f0/0x240 [ 757.299274][T30475] invoke_syscall+0x98/0x2b8 [ 757.300466][T30475] el0_svc_common+0x130/0x23c [ 757.301698][T30475] do_el0_svc+0x48/0x58 [ 757.302769][T30475] el0_svc+0x54/0x158 [ 757.303850][T30475] el0t_64_sync_handler+0x84/0xfc [ 757.305122][T30475] el0t_64_sync+0x190/0x194 00:12:37 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0, 0x2000000}], 0x1}, 0x0) 00:12:37 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 13) 00:12:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 00:12:37 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x7000000000000000, 0x100087}, 0x20) 00:12:37 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 13) 00:12:37 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x40049409, 0x0) 00:12:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x9}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) [ 757.945067][T30487] FAULT_INJECTION: forcing a failure. [ 757.945067][T30487] name failslab, interval 1, probability 0, space 0, times 0 [ 757.948369][T30487] CPU: 0 PID: 30487 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 757.950924][T30487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 757.953546][T30487] Call trace: [ 757.954369][T30487] dump_backtrace+0x1b8/0x1e4 [ 757.955630][T30487] show_stack+0x2c/0x44 [ 757.956760][T30487] dump_stack_lvl+0xd0/0x124 [ 757.957990][T30487] dump_stack+0x1c/0x28 [ 757.958797][T30491] FAULT_INJECTION: forcing a failure. [ 757.958797][T30491] name failslab, interval 1, probability 0, space 0, times 0 [ 757.959056][T30487] should_fail_ex+0x3b0/0x50c [ 757.963671][T30487] __should_failslab+0xc8/0x128 [ 757.964938][T30487] should_failslab+0x10/0x28 [ 757.966131][T30487] __kmem_cache_alloc_node+0x80/0x368 [ 757.967530][T30487] kmalloc_trace+0x3c/0x88 [ 757.968734][T30487] alloc_workqueue+0x1c4/0xf70 [ 757.970018][T30487] nci_register_device+0x1ec/0x7c4 [ 757.971386][T30487] virtual_ncidev_open+0x13c/0x1bc [ 757.972783][T30487] misc_open+0x2f0/0x368 [ 757.973928][T30487] chrdev_open+0x3c8/0x4dc [ 757.975081][T30487] do_dentry_open+0x778/0x12b4 [ 757.976330][T30487] vfs_open+0x7c/0x90 [ 757.977378][T30487] path_openat+0x1f6c/0x2888 [ 757.978562][T30487] do_filp_open+0x1bc/0x3cc [ 757.979705][T30487] do_sys_openat2+0x124/0x1b8 [ 757.980967][T30487] __arm64_sys_openat+0x1f0/0x240 [ 757.982270][T30487] invoke_syscall+0x98/0x2b8 [ 757.983494][T30487] el0_svc_common+0x130/0x23c [ 757.984752][T30487] do_el0_svc+0x48/0x58 [ 757.985812][T30487] el0_svc+0x54/0x158 [ 757.986847][T30487] el0t_64_sync_handler+0x84/0xfc [ 757.988144][T30487] el0t_64_sync+0x190/0x194 00:12:37 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0xffff80009ddcffff, 0x100087}, 0x20) [ 758.000956][T30491] CPU: 1 PID: 30491 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 758.003615][T30491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 758.006243][T30491] Call trace: [ 758.007152][T30491] dump_backtrace+0x1b8/0x1e4 [ 758.008409][T30491] show_stack+0x2c/0x44 [ 758.009518][T30491] dump_stack_lvl+0xd0/0x124 [ 758.010722][T30491] dump_stack+0x1c/0x28 [ 758.011849][T30491] should_fail_ex+0x3b0/0x50c [ 758.013034][T30491] __should_failslab+0xc8/0x128 [ 758.014310][T30491] should_failslab+0x10/0x28 [ 758.015508][T30491] kmem_cache_alloc+0x80/0x410 [ 758.016741][T30491] security_inode_alloc+0x30/0x124 [ 758.018171][T30491] inode_init_always+0x6b0/0xb24 [ 758.019521][T30491] new_inode_pseudo+0x7c/0x1d0 [ 758.020816][T30491] __ns_get_path+0x23c/0x540 [ 758.022025][T30491] ns_get_path+0x64/0xac [ 758.023121][T30491] proc_ns_get_link+0xf4/0x194 [ 758.024384][T30491] pick_link+0x530/0xb8c [ 758.025542][T30491] step_into+0x9fc/0xd1c 00:12:38 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0xffffdc9d0080ffff, 0x100087}, 0x20) [ 758.026662][T30491] path_openat+0x1384/0x2888 [ 758.027894][T30491] do_filp_open+0x1bc/0x3cc [ 758.029127][T30491] do_sys_openat2+0x124/0x1b8 [ 758.030421][T30491] __arm64_sys_openat+0x1f0/0x240 [ 758.031726][T30491] invoke_syscall+0x98/0x2b8 [ 758.032933][T30491] el0_svc_common+0x130/0x23c [ 758.034192][T30491] do_el0_svc+0x48/0x58 [ 758.035326][T30491] el0_svc+0x54/0x158 00:12:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0xa}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) [ 758.036384][T30491] el0t_64_sync_handler+0x84/0xfc [ 758.037693][T30491] el0t_64_sync+0x190/0x194 00:12:38 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 14) 00:12:38 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x70}, 0x20) [ 758.092439][T30503] FAULT_INJECTION: forcing a failure. [ 758.092439][T30503] name failslab, interval 1, probability 0, space 0, times 0 [ 758.095644][T30503] CPU: 1 PID: 30503 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 758.098181][T30503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 758.100771][T30503] Call trace: [ 758.101618][T30503] dump_backtrace+0x1b8/0x1e4 [ 758.102861][T30503] show_stack+0x2c/0x44 [ 758.103972][T30503] dump_stack_lvl+0xd0/0x124 [ 758.105207][T30503] dump_stack+0x1c/0x28 [ 758.106308][T30503] should_fail_ex+0x3b0/0x50c [ 758.107595][T30503] __should_failslab+0xc8/0x128 [ 758.108889][T30503] should_failslab+0x10/0x28 [ 758.110124][T30503] __kmem_cache_alloc_node+0x80/0x368 [ 758.111582][T30503] __kmalloc_node_track_caller+0xbc/0x1c0 [ 758.113084][T30503] kvasprintf+0x108/0x1dc [ 758.114249][T30503] kasprintf+0xe0/0x12c [ 758.115366][T30503] alloc_workqueue+0x448/0xf70 [ 758.116590][T30503] nci_register_device+0x1ec/0x7c4 [ 758.117954][T30503] virtual_ncidev_open+0x13c/0x1bc [ 758.119293][T30503] misc_open+0x2f0/0x368 [ 758.120404][T30503] chrdev_open+0x3c8/0x4dc [ 758.121598][T30503] do_dentry_open+0x778/0x12b4 [ 758.122903][T30503] vfs_open+0x7c/0x90 [ 758.123931][T30503] path_openat+0x1f6c/0x2888 [ 758.125132][T30503] do_filp_open+0x1bc/0x3cc [ 758.126385][T30503] do_sys_openat2+0x124/0x1b8 [ 758.127619][T30503] __arm64_sys_openat+0x1f0/0x240 [ 758.128966][T30503] invoke_syscall+0x98/0x2b8 [ 758.130192][T30503] el0_svc_common+0x130/0x23c [ 758.131466][T30503] do_el0_svc+0x48/0x58 [ 758.132578][T30503] el0_svc+0x54/0x158 [ 758.133595][T30503] el0t_64_sync_handler+0x84/0xfc [ 758.134923][T30503] el0t_64_sync+0x190/0x194 00:12:38 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0, 0x1000000000000}], 0x1}, 0x0) 00:12:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x14}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 00:12:38 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 14) 00:12:38 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x40086602, 0x0) 00:12:38 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x7000}, 0x20) 00:12:38 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) (fail_nth: 15) [ 758.859818][T30512] FAULT_INJECTION: forcing a failure. [ 758.859818][T30512] name failslab, interval 1, probability 0, space 0, times 0 [ 758.874138][T30519] FAULT_INJECTION: forcing a failure. [ 758.874138][T30519] name failslab, interval 1, probability 0, space 0, times 0 00:12:38 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x1000000}, 0x20) [ 758.878123][T30512] CPU: 1 PID: 30512 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 758.880858][T30512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 758.883525][T30512] Call trace: [ 758.884383][T30512] dump_backtrace+0x1b8/0x1e4 [ 758.885651][T30512] show_stack+0x2c/0x44 [ 758.886819][T30512] dump_stack_lvl+0xd0/0x124 [ 758.887984][T30512] dump_stack+0x1c/0x28 [ 758.889086][T30512] should_fail_ex+0x3b0/0x50c [ 758.890286][T30512] __should_failslab+0xc8/0x128 [ 758.891581][T30512] should_failslab+0x10/0x28 [ 758.892759][T30512] slab_pre_alloc_hook+0x6c/0x32c [ 758.894068][T30512] kmem_cache_alloc_lru+0x54/0x394 [ 758.895497][T30512] __d_alloc+0x40/0x6ac [ 758.896554][T30512] d_alloc_anon+0x24/0x34 [ 758.897687][T30512] __ns_get_path+0x2fc/0x540 [ 758.898897][T30512] ns_get_path+0x64/0xac [ 758.900048][T30512] proc_ns_get_link+0xf4/0x194 [ 758.901296][T30512] pick_link+0x530/0xb8c [ 758.902379][T30512] step_into+0x9fc/0xd1c [ 758.903498][T30512] path_openat+0x1384/0x2888 [ 758.904700][T30512] do_filp_open+0x1bc/0x3cc [ 758.905877][T30512] do_sys_openat2+0x124/0x1b8 [ 758.907080][T30512] __arm64_sys_openat+0x1f0/0x240 [ 758.908403][T30512] invoke_syscall+0x98/0x2b8 [ 758.909552][T30512] el0_svc_common+0x130/0x23c [ 758.910727][T30512] do_el0_svc+0x48/0x58 [ 758.911778][T30512] el0_svc+0x54/0x158 [ 758.912826][T30512] el0t_64_sync_handler+0x84/0xfc [ 758.914078][T30512] el0t_64_sync+0x190/0x194 00:12:38 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x70000000}, 0x20) [ 758.917762][T30519] CPU: 0 PID: 30519 Comm: syz-executor.2 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 758.920508][T30519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 758.923088][T30519] Call trace: [ 758.923892][T30519] dump_backtrace+0x1b8/0x1e4 [ 758.925068][T30519] show_stack+0x2c/0x44 [ 758.926098][T30519] dump_stack_lvl+0xd0/0x124 [ 758.927271][T30519] dump_stack+0x1c/0x28 [ 758.928366][T30519] should_fail_ex+0x3b0/0x50c [ 758.929575][T30519] __should_failslab+0xc8/0x128 [ 758.930819][T30519] should_failslab+0x10/0x28 [ 758.931966][T30519] __kmem_cache_alloc_node+0x80/0x368 [ 758.933310][T30519] __kmalloc+0xb8/0x1b8 [ 758.934367][T30519] apply_wqattrs_prepare+0x114/0x948 [ 758.935674][T30519] apply_workqueue_attrs+0xc4/0x170 [ 758.937023][T30519] alloc_workqueue+0xa08/0xf70 [ 758.938321][T30519] nci_register_device+0x1ec/0x7c4 [ 758.939646][T30519] virtual_ncidev_open+0x13c/0x1bc [ 758.940972][T30519] misc_open+0x2f0/0x368 [ 758.942063][T30519] chrdev_open+0x3c8/0x4dc [ 758.943241][T30519] do_dentry_open+0x778/0x12b4 [ 758.944406][T30519] vfs_open+0x7c/0x90 [ 758.945365][T30519] path_openat+0x1f6c/0x2888 [ 758.946558][T30519] do_filp_open+0x1bc/0x3cc [ 758.947737][T30519] do_sys_openat2+0x124/0x1b8 [ 758.948926][T30519] __arm64_sys_openat+0x1f0/0x240 [ 758.950185][T30519] invoke_syscall+0x98/0x2b8 [ 758.951416][T30519] el0_svc_common+0x130/0x23c [ 758.952621][T30519] do_el0_svc+0x48/0x58 [ 758.953666][T30519] el0_svc+0x54/0x158 [ 758.954680][T30519] el0t_64_sync_handler+0x84/0xfc [ 758.955955][T30519] el0t_64_sync+0x190/0x194 00:12:38 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x40186366, 0x0) 00:12:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x24}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 00:12:38 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 15) 00:12:38 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x100000000000000}, 0x20) [ 759.007053][T30530] FAULT_INJECTION: forcing a failure. [ 759.007053][T30530] name failslab, interval 1, probability 0, space 0, times 0 [ 759.010564][T30530] CPU: 1 PID: 30530 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 759.013085][T30530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 759.015651][T30530] Call trace: [ 759.016491][T30530] dump_backtrace+0x1b8/0x1e4 [ 759.017634][T30530] show_stack+0x2c/0x44 [ 759.018656][T30530] dump_stack_lvl+0xd0/0x124 [ 759.019893][T30530] dump_stack+0x1c/0x28 [ 759.020953][T30530] should_fail_ex+0x3b0/0x50c [ 759.022260][T30530] __should_failslab+0xc8/0x128 [ 759.023553][T30530] should_failslab+0x10/0x28 [ 759.024760][T30530] kmem_cache_alloc+0x80/0x410 [ 759.026005][T30530] getname_flags+0xd0/0x48c [ 759.027157][T30530] getname+0x28/0x38 [ 759.028164][T30530] do_sys_openat2+0xd0/0x1b8 [ 759.029319][T30530] __arm64_sys_openat+0x1f0/0x240 [ 759.030648][T30530] invoke_syscall+0x98/0x2b8 [ 759.031822][T30530] el0_svc_common+0x130/0x23c [ 759.033055][T30530] do_el0_svc+0x48/0x58 [ 759.034109][T30530] el0_svc+0x54/0x158 [ 759.035157][T30530] el0t_64_sync_handler+0x84/0xfc [ 759.036459][T30530] el0t_64_sync+0x190/0x194 00:12:39 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0, 0x200000000000000}], 0x1}, 0x0) 00:12:39 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0x7000000000000000}, 0x20) 00:12:39 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 16) 00:12:39 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x401c5820, 0x0) 00:12:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180), 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) [ 759.727678][T30539] FAULT_INJECTION: forcing a failure. [ 759.727678][T30539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 759.733861][T30539] CPU: 1 PID: 30539 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 759.736539][T30539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 759.739050][T30539] Call trace: [ 759.739883][T30539] dump_backtrace+0x1b8/0x1e4 [ 759.741061][T30539] show_stack+0x2c/0x44 [ 759.742157][T30539] dump_stack_lvl+0xd0/0x124 [ 759.743388][T30539] dump_stack+0x1c/0x28 [ 759.744492][T30539] should_fail_ex+0x3b0/0x50c [ 759.745717][T30539] should_fail+0x14/0x24 [ 759.746835][T30539] should_fail_usercopy+0x20/0x30 [ 759.748154][T30539] strncpy_from_user+0x48/0x54c [ 759.749410][T30539] getname_flags+0x104/0x48c [ 759.750641][T30539] getname+0x28/0x38 [ 759.751683][T30539] do_sys_openat2+0xd0/0x1b8 [ 759.752848][T30539] __arm64_sys_openat+0x1f0/0x240 [ 759.754182][T30539] invoke_syscall+0x98/0x2b8 [ 759.755414][T30539] el0_svc_common+0x130/0x23c [ 759.756692][T30539] do_el0_svc+0x48/0x58 [ 759.757802][T30539] el0_svc+0x54/0x158 [ 759.758892][T30539] el0t_64_sync_handler+0x84/0xfc [ 759.760303][T30539] el0t_64_sync+0x190/0x194 [ 801.770577][ T2222] ieee802154 phy0 wpan0: encryption failed: -22 [ 801.772281][ T2222] ieee802154 phy1 wpan1: encryption failed: -22 00:13:33 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x9, 0x0) 00:13:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x10, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 00:13:33 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0xffff80009ddcffff}, 0x20) 00:13:33 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x4020940d, 0x0) 00:13:33 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 17) 00:13:33 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0, 0xffff80009db9ffff}], 0x1}, 0x0) [ 813.955608][T30549] FAULT_INJECTION: forcing a failure. 00:13:33 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x10, 0x3}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) [ 813.955608][T30549] name failslab, interval 1, probability 0, space 0, times 0 [ 813.958826][T30549] CPU: 1 PID: 30549 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 813.961294][T30549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 813.963902][T30549] Call trace: [ 813.964719][T30549] dump_backtrace+0x1b8/0x1e4 [ 813.965925][T30549] show_stack+0x2c/0x44 [ 813.966996][T30549] dump_stack_lvl+0xd0/0x124 [ 813.968146][T30549] dump_stack+0x1c/0x28 [ 813.969275][T30549] should_fail_ex+0x3b0/0x50c [ 813.970455][T30549] __should_failslab+0xc8/0x128 [ 813.971711][T30549] should_failslab+0x10/0x28 [ 813.972820][T30549] kmem_cache_alloc+0x80/0x410 [ 813.974026][T30549] alloc_empty_file+0xac/0x1d4 [ 813.975258][T30549] path_openat+0xd0/0x2888 00:13:33 executing program 5: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x100087, 0xffffdc9d0080ffff}, 0x20) 00:13:33 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$VIDIOC_EXPBUF(r0, 0x40305828, 0x0) [ 813.976377][T30549] do_filp_open+0x1bc/0x3cc [ 813.977510][T30549] do_sys_openat2+0x124/0x1b8 [ 813.978695][T30549] __arm64_sys_openat+0x1f0/0x240 [ 813.979990][T30549] invoke_syscall+0x98/0x2b8 [ 813.981194][T30549] el0_svc_common+0x130/0x23c [ 813.982406][T30549] do_el0_svc+0x48/0x58 [ 813.983488][T30549] el0_svc+0x54/0x158 [ 813.984500][T30549] el0t_64_sync_handler+0x84/0xfc [ 813.985784][T30549] el0t_64_sync+0x190/0x194 00:13:33 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{0x0, 0xffffb99d0080ffff}], 0x1}, 0x0) 00:13:34 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000840)={&(0x7f0000000180)={0x10, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x10, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8}]}, 0x24}}, 0x0) 00:13:34 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') (fail_nth: 18) [ 814.084903][T30565] FAULT_INJECTION: forcing a failure. [ 814.084903][T30565] name failslab, interval 1, probability 0, space 0, times 0 [ 814.097662][T30565] CPU: 1 PID: 30565 Comm: syz-executor.4 Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 814.100290][T30565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 814.102840][T30565] Call trace: [ 814.103688][T30565] dump_backtrace+0x1b8/0x1e4 [ 814.104882][T30565] show_stack+0x2c/0x44 [ 814.105956][T30565] dump_stack_lvl+0xd0/0x124 [ 814.107118][T30565] dump_stack+0x1c/0x28 [ 814.108246][T30565] should_fail_ex+0x3b0/0x50c [ 814.109445][T30565] __should_failslab+0xc8/0x128 [ 814.110681][T30565] should_failslab+0x10/0x28 [ 814.111912][T30565] kmem_cache_alloc+0x80/0x410 [ 814.113194][T30565] security_file_alloc+0x30/0x124 [ 814.114552][T30565] init_file+0x9c/0x220 [ 814.115614][T30565] alloc_empty_file+0xc0/0x1d4 [ 814.116889][T30565] path_openat+0xd0/0x2888 [ 814.118035][T30565] do_filp_open+0x1bc/0x3cc [ 814.119217][T30565] do_sys_openat2+0x124/0x1b8 [ 814.120443][T30565] __arm64_sys_openat+0x1f0/0x240 [ 814.121729][T30565] invoke_syscall+0x98/0x2b8 [ 814.122882][T30565] el0_svc_common+0x130/0x23c [ 814.124104][T30565] do_el0_svc+0x48/0x58 [ 814.125177][T30565] el0_svc+0x54/0x158 [ 814.126217][T30565] el0t_64_sync_handler+0x84/0xfc [ 814.127495][T30565] el0t_64_sync+0x190/0x194 [ 863.201106][ T2222] ieee802154 phy0 wpan0: encryption failed: -22 [ 863.202744][ T2222] ieee802154 phy1 wpan1: encryption failed: -22 [ 905.440370][ T29] INFO: task syz-executor.2:30519 blocked for more than 143 seconds. [ 905.442710][ T29] Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 905.444482][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 905.446667][ T29] task:syz-executor.2 state:D stack:0 pid:30519 tgid:30515 ppid:6117 flags:0x0000000d [ 905.449670][ T29] Call trace: [ 905.450642][ T29] __switch_to+0x314/0x560 [ 905.451810][ T29] __schedule+0x1354/0x2360 [ 905.452913][ T29] schedule+0xb8/0x19c [ 905.453957][ T29] schedule_timeout+0xb8/0x348 [ 905.455164][ T29] do_wait_for_common+0x30c/0x468 [ 905.456480][ T29] wait_for_completion+0x48/0x60 [ 905.457810][ T29] kthread_flush_worker+0x214/0x2d4 [ 905.459132][ T29] alloc_workqueue+0xa30/0xf70 [ 905.460459][ T29] nci_register_device+0x1ec/0x7c4 [ 905.461778][ T29] virtual_ncidev_open+0x13c/0x1bc [ 905.463043][ T29] misc_open+0x2f0/0x368 [ 905.464167][ T29] chrdev_open+0x3c8/0x4dc [ 905.465316][ T29] do_dentry_open+0x778/0x12b4 [ 905.466581][ T29] vfs_open+0x7c/0x90 [ 905.467609][ T29] path_openat+0x1f6c/0x2888 [ 905.468777][ T29] do_filp_open+0x1bc/0x3cc [ 905.470003][ T29] do_sys_openat2+0x124/0x1b8 [ 905.471206][ T29] __arm64_sys_openat+0x1f0/0x240 [ 905.472491][ T29] invoke_syscall+0x98/0x2b8 [ 905.473700][ T29] el0_svc_common+0x130/0x23c [ 905.474939][ T29] do_el0_svc+0x48/0x58 [ 905.475964][ T29] el0_svc+0x54/0x158 [ 905.476948][ T29] el0t_64_sync_handler+0x84/0xfc [ 905.478170][ T29] el0t_64_sync+0x190/0x194 [ 905.479343][ T29] [ 905.479343][ T29] Showing all locks held in the system: [ 905.482381][ T29] 1 lock held by khungtaskd/29: [ 905.483609][ T29] #0: ffff80008e6c4680 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0xc/0x44 [ 905.486032][ T29] 2 locks held by kworker/u4:9/574: [ 905.487468][ T29] 2 locks held by klogd/5705: [ 905.488765][ T29] 2 locks held by getty/5860: [ 905.490067][ T29] #0: ffff0000d6e3a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 905.492549][ T29] #1: ffff800094e702f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x41c/0x1228 [ 905.495078][ T29] 1 lock held by syz-executor.2/30519: [ 905.496458][ T29] #0: ffff80008fc13988 (misc_mtx){+.+.}-{3:3}, at: misc_open+0x6c/0x368 [ 905.498689][ T29] 1 lock held by syz-executor.2/30567: [ 905.500214][ T29] #0: ffff80008fc13988 (misc_mtx){+.+.}-{3:3}, at: misc_open+0x6c/0x368 [ 905.502408][ T29] 1 lock held by syz-executor.2/30575: [ 905.503787][ T29] #0: ffff80008fc13988 (misc_mtx){+.+.}-{3:3}, at: misc_open+0x6c/0x368 [ 905.506027][ T29] [ 905.506647][ T29] ============================================= [ 905.506647][ T29] [ 905.508877][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 905.510580][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.7.0-rc4-syzkaller-gd46efae31672 #0 [ 905.513042][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 905.515678][ T29] Call trace: [ 905.516582][ T29] dump_backtrace+0x1b8/0x1e4 [ 905.517766][ T29] show_stack+0x2c/0x44 [ 905.518800][ T29] dump_stack_lvl+0xd0/0x124 [ 905.520056][ T29] dump_stack+0x1c/0x28 [ 905.521159][ T29] panic+0x30c/0x88c [ 905.522203][ T29] hung_task_panic+0x0/0x2c [ 905.523375][ T29] kthread+0x288/0x310 [ 905.524491][ T29] ret_from_fork+0x10/0x20 [ 905.525689][ T29] SMP: stopping secondary CPUs [ 905.526936][ T29] Kernel Offset: disabled [ 905.528083][ T29] CPU features: 0x00000010,38010026,21017203 [ 905.529652][ T29] Memory Limit: none [ 906.340901][ T29] Rebooting in 86400 seconds..